First Report on Security Models for the TPM

Summary
Initial report describing and outlining security models for various implementations of TPM.