Summary
Initial report describing and outlining security models for various implementations of TPM.
More information & hyperlinks