“…In addition, researchers have developed systems that utilize the TPM for anonymous attestation [31], authentication [32], device attestation [33], digital rights management [34], digital signature [35], distributed computing [36], drive encryption [37], e-voting [38], grid security [39], identity management [40], mobile agents [41], on-line payment [42], on-line storage [43], peer-to-peer networks [44], policy enforcement [45], and virtualization [46]. Recently, there have been proposals to integrate trusted computing into the power grid [27,47,48]. These studies, except our work in [27], however, do not consider a security service that will hide information from the rest of the system including the system administrator as in the blind processing.…”