This course discusses the underlying mechanisms and technologies needed for trusted computing, which include hardware and trust models, attestation protocols such as Direct Anonymous Attestation and Single Sign-On to make authorization decisions. It will(This course discusses the underlying mechanisms and technologies needed for trusted computing, which include hardware and trust models, attestation protocols such as Direct Anonymous Attestation and Single Sign-On to make authorization decisions. It will)