The good measurements can also be available
from a trusted source, as in the Integrity Measurement Architecture
(IMA) [24], or the vendor of the software that the user is using. The
checking of the measurement values is not part of the actual protocol,
which only focuses on the secure delivery of the measured values.