Motivating Scenarios -- Attacks -- Foundations -- Design Challenges -- Platform Architecture -- Outbound Authentication -- Validation -- Application Case Studies -- TCPA/TCG -- Experimenting with TCPA/TCG -- New Horizons.How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial effor…