
doi: 10.1109/itcs.2010.47
Trusted Computing has become the research focus in information security field. Its idea is to embed a secure chip named TPM (Trusted Platform Module) in the computer’s hardware, with which a trust chain can be set up to ensure the trust of computer. Since the resources of TPM are restricted, the interfaces and capabilities are cumbersome. In order to solve these problems, TCG gave a TSS (TCG Software Stack) specification. According to the TSS specification, TSS consists of 4 modules. Among them, TSP (TSS Service Provider) is directly related to the applications layer, so its design will affect the convenience of the user application. Module division, relations of classes and objects operating methods of TSP were presented, which described a comprehensive TSP module development process. In addition, an application of TSS using was given.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
