十年网站开发经验 + 多家企业客户 + 靠谱的建站团队
量身定制 + 运营维护+专业推广+无忧售后,网站问题一站解决
可信计算组织(Ttrusted Computing Group,TCG)是一个非盈利的工业标准组织,它的宗旨是加强在相异计算机平台上的计算环境的安全性。TCG于2003年春成立,并采纳了由可信计算平台联盟(the Trusted Computing Platform Alliance,TCPA)所开发的规范。现在的规范都不是最终稿,都还在不断的更新中,比如:TPM的规范就从原来的v1.0更新到v1.2,现在还在不断的修订。
创新互联公司是一家集网站建设,长顺企业网站建设,长顺品牌网站建设,网站定制,长顺网站建设报价,网络营销,网络优化,长顺网站推广为一体的创新建站企业,帮助传统企业提升企业形象加强企业竞争力。可充分满足这一群体相比中小企业更为丰富、高端、多元的互联网需求。同时我们时刻保持专业、时尚、前沿,时刻以成就客户成长自我,坚持不断学习、思考、沉淀、净化自己,让我们为更多的企业打造出实用型网站。一、工作组规范概览 1.Available这部分是我们目前能够下载到的部分规范。
├── Cloud 工作组
│ ├── Cloud-Computing-and-Security-Whitepaper_July29.2010.pdf
│ ├── TMI_Reference_Model_V1_00R1_0.pdf
│ ├── TMI_Trust_Assessment_Framework-v2r48.pdf
│ └── TMI_Use_Cases_V1.1_Final.pdf
├── Cyber Resillient Technologies
│ └── Cyber-Resilient-Module-and-Building-Block-Requirements-V1-R0.2_pub.pdf
├── DICE工作组
│ ├── DICE-Attestation-Architecture-r23-final.pdf
│ ├── DICE-Certificate-Profiles-r01_pub.pdf
│ ├── DICE-Layering-Architecture-r19_pub.pdf
│ ├── Foundational-Trust-for-IOT-and-Resource-Constrained-Devices.pdf
│ ├── Hardware-Requirements-for-Device-Identifier-Composition-Engine-r78_For-Publication.pdf
│ ├── TCG-DICE-Arch-Implicit-Identity-Based-Device-Attestation-v1-rev93.pdf
│ ├── TCG-Endorsement-Architecture-for-Devices-V1-R38_pub.pdf
│ └── TCG_DICE_SymIDAttest_v1_r0p95_pub-1.pdf
├── Embedded Systems 工作组
│ ├── Establishing-Network-Equipment-Security_rev-July-21-2017.pdf
│ ├── Secure-Embedded-Platforms-with-Trusted-Computing-Automotive-and-Other-Systems-in-the-Internet-of-Things-Must-Be-Protected.pdf
│ ├── TCG-Architects-Guide_2018_FC01_web.pdf
│ ├── TCG-Guidance-for-Securing-Resource-Constrained-Devices-v1r22.pdf
│ ├── TCG-Secure-Update-of-SW-and-FW-on-Devices-v1r72_pub.pdf
│ ├── TCG_Guidance_for_Securing_Industrial_Control_Systems_v1_r109_pub10jan2022.pdf
│ ├── TCG_Guidance_for_Securing_NetEq_1_0r29.pdf
│ ├── TCG_TPM_2.0_Automotive_Thin_Profile_v1.1-r15.pdf
│ └── TCG_UseCases_MARS_v1p0_r27_pub.pdf
├── Industrial 工作组
│ ├── 04_TCG_StdsSecureEquip_2018_Web.pdf
│ ├── ICS-Security-Using-TNC-Technology-Architects-Guide.pdf
│ ├── Standards-for-Securing-Industrial-Equipment.pdf
│ ├── TCG_Guidance_for_Securing_Industrial_Control_Systems_v1_r109_pub10jan2022.pdf
│ └── TNC_IFMAP_v2_2r10.pdf
├── Infrastructure 工作组
│ ├── CoreIntegrity_Schema_Specification_v2.0.r5.pdf
│ ├── Credential_Profiles_V1.2_Level2_Revision8.pdf
│ ├── DICE-Attestation-Architecture-r23-final.pdf
│ ├── DICE-Certificate-Profiles-r01_pub.pdf
│ ├── DICE-Layering-Architecture-r19_pub.pdf
│ ├── IWG-IF-PTS_v1.pdf
│ ├── IWG-SimpleObject_Schema_Specification_v1.pdf
│ ├── IWG-Verification_Result_v1_0.pdf
│ ├── IWG_ArchitecturePartII_v1.0.pdf
│ ├── IWG_Architecture_v1_0_r1.pdf
│ ├── IWG_Backup_and_Migration_Services_1-00_1-00.pdf
│ ├── IWG_CMC_Profile_Cert_Enrollment_v1_r7.pdf
│ ├── IWG_EK_Platform_Enrollment_v1_0_r5_Published.pdf
│ ├── IWG_Platform_Certificate_Profile_v1p1_r19_pub_fixed.pdf
│ ├── IWG_SKAE_Extension_1-00.pdf
│ ├── IWG_Security_Qualities_Schema_v1_1_r07.pdf
│ ├── IWG_specs_FAQ_May_14_final.pdf
│ ├── Reference_Manifest_Schema_Specification_v2.0.r5.pdf
│ ├── SMBIOS-Component-Class-Registry_v1.01_finalpublication.pdf
│ ├── TCG-Platform-Attribute-Credential-Profile-Version-1.0.pdf
│ ├── TCG-TPM-v2.0-Provisioning-Guidance-Published-v1r1.pdf
│ ├── TCG_1_4_Architecture_Overview.pdf
│ ├── TCG_IWG_CEL_v1_r0p41_pub.pdf
│ ├── TCG_IWG_EKCredentialProfile_v2p4_r3.pdf
│ ├── TCG_PCIe_Component_Class_Registry_v1_r18_pub10272021.pdf
│ ├── TCG_PC_Client_RIM_r1p04_pub.pdf
│ ├── TCG_RIM_Model_v1p01_r0p16_pub.pdf
│ ├── TCG_TNC_TAP_Use_Cases_v1r0p35_published.pdf
│ ├── TNC_TAP_Information_Model_v1.00_r0.36-FINAL.pdf
│ ├── TPM-2p0-Keys-for-Device-Identity-and-Attestation_v1_r12_pub10082021.pdf
│ └── TPM_Keys_for_Platform_Identity_v1_0_r3_Final.pdf
├── Internet of Things(IoT)工作组
│ ├── 375289_TCG_InformationWeek_Webcast_12132011_v4.pdf
│ ├── INFOGRAPHIC-TCG-IoT-FINAL.pdf
│ ├── TCG-Architects-Guide_2018_FC01_web.pdf
│ ├── TCG-Secure-Update-of-SW-and-FW-on-Devices-v1r72_pub.pdf
│ ├── TCG_Guidance_for_Securing_IoT_1_0r21.pdf
│ └── TPM-and-Smart-Buildings.pdf
├── Measurement and Attestation RootS(MARS)工作组
│ ├── MARS_Library_Errata_v1r0_pub.pdf
│ ├── TCG_MARS_Library_Spec_v1r14_pub.pdf
│ └── TCG_UseCases_MARS_v1p0_r27_pub.pdf
├── Mobile 工作组
│ ├── 05_TCG_Mobile_Specs_Guide_2018_web.pdf
│ ├── 2018_TCG_ArchsGuide_PortDevSecTNC_FC01web.pdf
│ ├── MPWG-Selected_Mobile_Phone_Use_Case_Analyses_v1.pdf
│ ├── MPWG-tcg-mobile-reference-architecture-1.pdf
│ ├── Mobile-Command-Response-Buffer-Interface-v2-r12-Specification_FINAL2.pdf
│ ├── Multiple-Stakeholder-Model-v3r40-mobile.pdf
│ ├── Revision_7.02-_29April2010-tcg-mobile-trusted-module-1.0.pdf
│ ├── TCG-Mobile-Trusted-Module-2-0-Use-Cases-v1-0.pdf
│ ├── TCG_MPWG_RIP_r106_published.pdf
│ ├── TCG_TMS_Use_Cases_BYOD_v1r1.pdf
│ ├── TCG_TMS_Use_Cases_Mobile_v2r47.pdf
│ ├── TPM-2-0-Mobile-Reference-Architecture-v2-r142-Specification_FINAL2.pdf
│ ├── TPM-MOBILE-with-Trusted-Execution-Environment-for-Comprehensive-Mobile-Device-Security.pdf
│ ├── TPM_2.0_Mobile_Common_Profile_v2r31_FINAL.pdf
│ ├── Trusted-Network-Communications-for-Mobile-Platforms-r28_pub.pdf
│ ├── tcg-mobile-reference-architecture-normative-requirements-check-list_28May09.pdf
│ └── tcg-mtm-mobile-abstraction-layer-1.0r2.03.pdf
├── Network Equipment 工作组
│ ├── 03_TCG_EstablishingNetEQ_2017_web.pdf
│ ├── Architects-Guide_Securing_Network_Equipment.pdf
│ ├── TCG-on-Securing-Network-Equipment.pdf
│ └── TCG_SNMP_MIB_for_TPM-Based_Attestation_v1p0_r7_pub06jan22.pdf
├── PC Client 工作组
│ ├── EFI-Protocol-Specification-rev13-160330final.pdf
│ ├── PC-Client-Specific-Platform-TPM-Profile-for-TPM-2p0-v1p05p_r14_pub.pdf
│ ├── PC_Client_TPM_PP_1.3_for_TPM_1.2_Level_2_V116.pdf
│ ├── PC_client_FAQ_final_jan_30_2006.pdf
│ ├── Physical-Presence-Interface_1-30_0-52.pdf
│ ├── PhysicalPresenceInterface_FAQ_final_03_2007.pdf
│ ├── TCG-PC-Client-FIM_v1p0_r0p43_pub.pdf
│ ├── TCG-PC-Client-TPM-I2C-Interface-Specification-Errata-v1.0.pdf
│ ├── TCG-TPM-I2C-Interface-Specification-v1.00.pdf
│ ├── TCG_ACPIGeneralSpec_v1p3_r8_pub.pdf
│ ├── TCG_D-RTM_Architecture_v1-0_Published_06172013.pdf
│ ├── TCG_EFI_Platform_1_22_Final_-v15.pdf
│ ├── TCG_FIPS_140_Guidance_for_TPM2_0_v1r1_20170202.pdf
│ ├── TCG_PCClientImplementation_1-21_1_00.pdf
│ ├── TCG_PCClientTPMInterfaceSpecification_TIS__1-3_27_03212013.pdf
│ ├── TCG_PCClient_Device_Driver_Design_Principles_TPM2p0_v1p1_r4_211104_final.pdf
│ ├── TCG_PCClient_PFP_r1p05_v23_pub.pdf
│ ├── TCG_PCClient_PP_1p3_for_Library_1p59_pub_29sept2021.pdf
│ ├── TCG_PCSpecificSpecification_v1_1.pdf
│ └── TCG_PlatformResetAttackMitigationSpecification_1.10_published.pdf
├── Server 工作组
│ ├── EFI-Protocol-Specification-rev13-160330final.pdf
│ ├── Itanium-Architecture-Server-Specification.pdf
│ ├── Mandatory-and-Optional-TPM-Commands.pdf
│ ├── Physical-Presence-Interface_1-30_0-52.pdf
│ ├── Server-Work-Group-Generic-Server-Specification-Frequently-Asked-Qusetions.pdf
│ ├── TCG_1_4_Architecture_Overview.pdf
│ ├── TCG_ACPIGeneralSpec_v1p3_r8_pub.pdf
│ ├── TCG_Generic_Server_Specification_v1_0_rev0_8.pdf
│ └── TCG_ServerManagDomainFWProfile_r1p00_pub.pdf
├── Storage 工作组
│ ├── 03-000216.1.03_CBIHealth.pdf
│ ├── Architects-Guide-Cybersecurity.pdf
│ ├── Architects-Guide-Data-Security-Using-TCG-Self-Encrypting-Drive-Technology.pdf
│ ├── Dave_Anderson_ACSAC_20041207.pdf
│ ├── FAQ_TCG_Storage-Enterprise_Feature_Set-Locking_LBA_Ranges_Control_v1_00_r1_00.pdf
│ ├── INFOGRAPHIC-Save-the-Data-Self-Encrypting-Drives-UPDATE-2020.pdf
│ ├── Opal_SSC_Certification_Test_Cases_v2_01_r1_00.pdf
│ ├── Opal_TestCases_FAQ_final_Feb_04-2_2011.pdf
│ ├── Optical_SSC-100.pdf
│ ├── SANS-Implementing-Hardware-Roots-of-Trust.pdf
│ ├── SNIATechnicalProposal-Security-BCPs-20080904.pdf
│ ├── SSIF_Solutions_Guide_for_Data-at-Rest.pdf
│ ├── SWG-Certification-Progam-Approved-Test-Houses-and-Test-Suites-Ver-1.04_publication.pdf
│ ├── Storage-Interface-Interactions-Specification-FAQ_1_08_Final.pdf
│ ├── Storage-Ruby-SSC-v1.0-Specification-FAQ_20182811_Final.pdf
│ ├── Storage_Certification_Program_Rev_1_22_publication.pdf
│ ├── TCG-Storage-Application-Note-Configurable-Namespace-Locking-Examples-V1-R2_pub-1.pdf
│ ├── TCG-Storage-Feature-Set-Configurable-Locking-for-NVMe-Namespaces-and-SCSI-LUNs-Version-1.02-Revision-1.16_pub-1.pdf
│ ├── TCG-Storage-Opal-SSC-2.02-Changes-From-Opal-SSC-2.01-rev0.03-04122022_FINAL_FAQ_.pdf
│ ├── TCG-Storage-Opal-SSC-v2p02-r1p0_pub24jan2022.pdf
│ ├── TCG_Storage-Core_Spec_Addendum_Secure_Messaging_v1.00_r1.00.pdf
│ ├── TCG_Storage-Enterprise_Feature_Set-Locking_LBA_Ranges_Control_v1_00_r1_00-1.pdf
│ ├── TCG_Storage-Enterprise_Feature_Set_PSK_Secure_Messaging_v1.00_r1.00.pdf
│ ├── TCG_Storage-Feature_Set_Block_SID_Authentication_v1.01_r1.00.pdf
│ ├── TCG_Storage-Feature_Set_ShadowMBR_for_Multiple_Namespaces_v1p00_r1p21_pub.pdf
│ ├── TCG_Storage-Opal_Feature_Set-Additional_DataStore_Tables_v1_00_r1_00_Final.pdf
│ ├── TCG_Storage-Opal_Feature_Set-Configurable_Namespace_Locking-v1.0-FAQs-20181128_Final.pdf
│ ├── TCG_Storage-Opal_Feature_Set_CNL_v1_00_r1_00_pub.pdf
│ ├── TCG_Storage-Opal_Feature_Set_PSID_v1.00_r1.00.pdf
│ ├── TCG_Storage-Opal_Feature_Set_PSK_Secure_Messaging_v1.00_r1.00.pdf
│ ├── TCG_Storage-Opal_Feature_Set_Single_User_Mode_v1.00_r2.00.pdf
│ ├── TCG_Storage-Opalite_SSC_v1.00_r1.00.pdf
│ ├── TCG_Storage-Pyrite_SSC_v2p01_r1p00_pub.pdf
│ ├── TCG_Storage-SSC_Enterprise-v1.01_r1.00.pdf
│ ├── TCG_Storage_Architecture_Core_Spec_v2.01_r1.00.pdf
│ ├── TCG_Storage_Opal_Family_Test_Cases_v1_00_r1_00_pub.pdf
│ ├── TCG_Storage_Opal_SSC_Application_Note_1-00_1-00-Final.pdf
│ ├── TCG_Storage_Protection_Mechanisms_for_Secrets_1-00_1-00_FINAL.pdf
│ ├── TCG_Storage_ReferenceDocument_Opal_Integration_Guidelines_v1.00_r1.00.pdf
│ ├── TCG_Storage_SIIS_v1p10_r1p29_pub_14nov2021.pdf
│ ├── TCG_Storage_SSC_Ruby_v1_r1_pub-1.pdf
│ └── TCGandNVMe_Joint_White_Paper-TCG_Storage_Opal_and_NVMe_FINAL.pdf
├── TPM Software Stack(TSS) 工作组
│ ├── Creating_the_Complete_Trusted_Computing_Ecosystem.pdf
│ ├── TCG_TSS_Marshaling_Unmarshaling_API_v1p0_r07_pub.pdf
│ ├── TCG_TSS_RC_v1p0_r12_pub.pdf
│ ├── TCG_TSS_TCTI_v1p0_r18_pub.pdf
│ ├── TSS_2p0_TAB_ResourceManager_v1p0_r18_04082019_pub.pdf
│ ├── TSS_ESAPI_v1p0_r14_pub10012021.pdf
│ ├── TSS_FAPI_v0p94_r09_pub.pdf
│ ├── TSS_JSON_Policy_v0p7_r08_pub.pdf
│ ├── TSS_Overview_Common_v1_r10_pub09232021.pdf
│ ├── TSS_SAPI_v1p1_r36_pub10012021.pdf
│ └── TSS_Version_1.2_Level_1_FINAL.pdf
├── Trusted Network Communications(TNC) 工作组
│ ├── 04262011_TCG_IW_Combined-Presentation_Final.pdf
│ ├── 2009-RSA-TNC-seminar-afternoon-final.pdf
│ ├── 20StorySnowCastle_RSAC2015.pdf
│ ├── AG_BYOD-Security-Using-TCG-Technology.pdf
│ ├── Architects-Guide-Comply-to-Connect-Using-TNC-Technology.pdf
│ ├── Architects-Guide-Cybersecurity.pdf
│ ├── Controlling-Network-Access-and-Endpoints_Nov2007.pdf
│ ├── CoreIntegrity_Schema_Specification_v2.0.r5.pdf
│ ├── Endpoint-Compliance-Profile-v1r10.pdf
│ ├── Fear-and-Loathing-in-BYOD-Final_Updated.pdf
│ ├── Federated-TNC-FAQ-final-may-8-09.pdf
│ ├── How_to_Use_TPM_Whitepaper_20090302_Final_3_.pdf
│ ├── ICS-Security-Using-TNC-Technology-Architects-Guide.pdf
│ ├── ICSJWG2012-IFMAP-Metadata-for-ICS-Security.pdf
│ ├── IF-TNCCS-SOH_v1.0_r8.pdf
│ ├── IFMAP-for-ICS-Comments.pdf
│ ├── IFM_Segmentation_v1r5_04042016.final_.pdf
│ ├── INFOGRAPHIC-TCG-part-3-1.jpg
│ ├── IWG-IF-PTS_v1.pdf
│ ├── IWG-SimpleObject_Schema_Specification_v1.pdf
│ ├── IWG-Verification_Result_v1_0.pdf
│ ├── IWG_Integrity_Report_Schema_v2.0.r5.pdf
│ ├── IWG_Security_Qualities_Schema_v1_1_r07.pdf
│ ├── Juniper-Networks_Bangchak.pdf
│ ├── Juniper-Networks_City-of-Sudbury_Case-Study.pdf
│ ├── NCP_Juniper_EUSKOM.pdf
│ ├── New-Standards-Lays-the-Foundation-Juniper.pdf
│ ├── Reference_Manifest_Schema_Specification_v2.0.r5.pdf
│ ├── SCAP_Messages_For_IFM_v0_16.pdf
│ ├── SWID_Messages_For_IFM_v1r29.pdf
│ ├── St.-Marys-County.pdf
│ ├── St.-Monicas-College.pdf
│ ├── TCG-Comply-to-Connect-Architects-Guide.pdf
│ ├── TCG-ICS-Spec-for-Network-Segmentation.pdf
│ ├── TCG-Security-Automation-Architects-Guide.pdf
│ ├── TCG-Seminar_RSA-2014-ProgramGuide.pdf
│ ├── TCG-TNC-Architecture-for-Interoperability-Version-2.0-Revision-13-.pdf
│ ├── TCG-Trusted-Network-Communications-Server-Discovery-and-Validation-Version-1.0-Revision-25-1.pdf
│ ├── TCG_1_4_Architecture_Overview.pdf
│ ├── TCG_Guidance_for_Securing_IoT_1_0r21.pdf
│ ├── TCG_TNC_TAP_Use_Cases_v1r0p35_published.pdf
│ ├── TNC-Architecture-Solution-Brief_Final.pdf
│ ├── TNC-Briefing-2013-12-10.pdf
│ ├── TNC-IETF-FAQ.pdf
│ ├── TNC_CESP_v1.0r14.pdf
│ ├── TNC_Federated_TNC_v1.0-r27.pdf
│ ├── TNC_Global-Professional_Services_Firm_Case-Study.pdf
│ ├── TNC_IF-MAP-Overview-04-2009.pdf
│ ├── TNC_IF-MAP_Whitepaper_Sept2010_Final.pdf
│ ├── TNC_IF-PEP-v1.1-rev-0.8.pdf
│ ├── TNC_IF-TNCCS_v1_2_r6.pdf
│ ├── TNC_IFIMC_v1_3_r18.pdf
│ ├── TNC_IFMAP_Metadata_For_Network_Security_v1_1r9.pdf
│ ├── TNC_IFMAP_v2_2r10.pdf
│ ├── TNC_IFM_v1_0_r41-a.pdf
│ ├── TNC_IFT_EAP_v2_0_r5-a2.pdf
│ ├── TNC_IFT_TLS_v2_0_r8.pdf
│ ├── TNC_NAP_white_paper_final_may_18_07.pdf
│ ├── TNC_OpenStandards_April2011.pdf
│ ├── TNC_SCAP_Integration-Whitepaper_09272010.pdf
│ ├── TNC_TAP_Information_Model_v1.00_r0.36-FINAL.pdf
│ ├── Trusted-Network-Communications-for-Mobile-Platforms-r28_pub.pdf
│ ├── iLabs-IF-MAP-white-paper-april-28-08.pdf
│ ├── infoblox-whitepaper-if-map-orchestration-1.pdf
│ ├── trusted-network-communications-faq.pdf
│ └── us-cio-council-byod-toolkit-20120829.pdf
├── Trusted Platform Module(TPM) 工作组
│ ├── 2019_TCG_TPM2_BriefOverview_DR02web.pdf
│ ├── How_to_Use_TPM_Whitepaper_20090302_Final_3_.pdf
│ ├── INFOGRAPHIC-TPM-Part-03_2014-1.jpg
│ ├── PC_Client_TPM_PP_1.3_for_TPM_1.2_Level_2_V116.pdf
│ ├── Physical-Presence-Interface_1-30_0-52.pdf
│ ├── RegistryOfReservedTPM2HandlesAndLocalities_v1p1_pub.pdf
│ ├── SANS-Implementing-Hardware-Roots-of-Trust.pdf
│ ├── SHA1-Impact_V2.0.pdf
│ ├── TCG-Glossary-V1.1-Rev-1.0.pdf
│ ├── TCG-TPM-VendorIDRegistry-v1p06-r0p91-pub.pdf
│ ├── TCG-_Algorithm_Registry_r1p32_pub.pdf
│ ├── TCG_1_4_Architecture_Overview.pdf
│ ├── TCG_Authentication_Webcast_Slides_Final.pdf
│ ├── TCG_PCClient_PP_1p3_for_Library_1p59_pub_29sept2021.pdf
│ ├── TCPA_Main_TCG_Architecture_v1_1b.pdf
│ ├── TPM-Main-Part-3-Commands_v1.2_rev116_01032011.pdf
│ ├── TPM-Overview.pdf
│ ├── TPM2.0-Library-Spec-v1.59-Errata_v1.3_pub.pdf
│ ├── Trusted-Platform-Module-Library-Family-2.0-Level-00-Revision-1.59_pub.zip
│ └── Trusted-Platform-Module-Summary_04292008.pdf
└── Virtualized Platform 工作组
└── TCG_VPWG_Architecture_V1-0_R0-26_FINAL.pdf
这部分是我们目前没有下载到的部分规范。
│ ├──TCG Guidance for Securing Resource Constrained Devices
├──Industrial 工作组
│ ├──Industrial Internet Security Framework
├──Internet of Things(IoT) 工作组
│ ├──Webcast: What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data
│ ├──Webcast: What Embedded and IoT Developers Think About IoT Security: A Look at the ECD and TCG Survey
│ ├──Webcast: Securing IoT Endpoints, Networks and the Cloud
│ ├──Webcast: Protecting Intellectual Property in the IoT with Trusted Computing
TCG Technologies for Protecting Internet of Things (IoT) Against Attacks Webcast
├──Measurement and Attestation RootS(MARS) 工作组
│ ├──MARS Emulators
├──Mobile 工作组
│ ├──Securing Mobile Devices on Converged Networks
├──PC Client 工作组
│ ├──PC Client TPM Certification
├──Storage 工作组
│ ├──Save the Data: A TCG Webcast on How to Protect Data, Wherever It Lives
│ ├──Webcast: Save the Data: How to Protect Data Wherever It Lives
Webcast
│ ├──Stop Data Breaches Now: A Webcast on Self-encrypting Drives for Enterprises
│ ├──Storage Work Group Storage Security Subsystem Class: Opal FAQs
│ ├──Dr. Michael Willett Talks Self-Encrypting Drives During TCG Seminar
│ ├──Storage Work Group Storage Interface Interactions Specification FAQs
│ ├──Data Protection and Security Issues Drive Adoption of Widely Available Self-Encrypting Drives Based on Industry Standards
│ ├──Commonly Asked Questions and Answers on Self-encrypting Drives
│ ├──Where is your Data Tonight? A Lesson in Avoiding Headlines, Fines or Worse
│ ├──Solving the Data Security Dilemma with Self Encrypting Drives
│ ├──TCG Storage Specifications and Key Management
│ ├──Data Protection: Governance, Risk Management, and Compliance
│ ├──Storage Work Group Storage Security Subsystem Class: Enterprise FAQs
├──TPM Software Stack(TSS) 工作组
│ ├──TCG Software Stack Specification (TSS) 1.2 FAQ
├──Trusted Network Communications(TNC) 工作组
│ ├──Industrial Control System (ICS) Security Using TNC Technology Webcast
│ ├──TNC IF-MAP Metadata for ICS Security 1.0 FAQs
│ ├──TCG TNC MAP Content Authorization
│ ├──Open Source IF-MAP Server (omapd)
│ ├──strongSwan Open Source Project
│ ├──RSA Conference 2013 Panel-Network Security, Critical Infrastructure and BYOD
│ ├──TNC@HsH
│ ├──Comments for TNC SCAP Messages for IF-M
│ ├──TNC IF-MAP 2.1 FAQ
│ ├──TNC SCAP Messages for IF-M 1.0 FAQs
│ ├──Commonly Asked Questions and Answers – TNC/InformationWeek Webcast
│ ├──Open Source TNC SDK
│ ├──TNC IF-MAP Interoperability Demonstration
│ ├──TNC Interfaces Enable Dynamic Differentiation
│ ├──Juniper Networks Demonstrates Mobile User/Remote Access
│ ├──Byres Security Demonstrates Industrial Control System (SCADA)
│ ├──Lumeta Demonstrates Pervasive Security with TNC Data Center Management
│ ├──Trusted Network Connect (TNC) Clientless Endpoint Security Profile FAQ
│ ├──Libtnc
│ ├──The Free RADIUS Project
│ ├──Open Platform Trust Service
│ ├──TNC IF-MAP FAQs
│ ├──TCG TNC IF-IMV Specification
├──Trusted Platform Module(TPM) 工作组
│ ├──How to Use the Trusted Platform Module (TPM) for Trust and Security
│ ├──Trusted Platform Module(TPM)===》A Practical Guide to TPM 2.0
│ ├──Trusted Platform Module(TPM)===》TPM / J0.3 User’s Guide
│ ├──Trusted Platform Module(TPM)===》European Multilaterally Secure Computing Base
│ ├──Trusted Platform Module(TPM)===》TPM / J0.3 UserÍs Guide
本文简要描述了TCG 工作组规范和规范总体结构,后面章节讲对各个工作组规范进行详述,并从规范结构角度对各个规范进行详细解读。
TCG标准规范免费下载
分享知识是一种美德,如果你感觉这篇文章写的还不错,请分享给身边需要的人。
文章内容不足之处,欢迎大家来评论区斧正~
赠人玫瑰,手有余香
下一章 TCG 规范工作组
你是否还在寻找稳定的海外服务器提供商?创新互联www.cdcxhl.cn海外机房具备T级流量清洗系统配攻击溯源,准确流量调度确保服务器高可用性,企业级服务器适合批量采购,新人活动首月15元起,快前往官网查看详情吧