Information technology — Security techniques — Requirements for establishing virtualized roots of trustTechnologies...