Chapter 1. Introduction to trust and Intel trusted execution technology -- chapter 2. Fundamental principles of Intel TXT -- chapter 3. Getting it to work : provisioning Intel TXT -- chapter 4. Foundation for control : establishing launch control policy -- chapter 5. Raising visibility for trust : the role of attestation -- chapter 6. Trusted computing : opportunities in software -- chapter 7. Creating a more secure datacenter and cloud -- chapter 8. The future of trusted computing
Summary
This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools