Second Report on Security Models for the TPM

Summary
Final version of the report describing and outlining security models for the TPM.