Trusted Computing (häftad)
Format
Inbunden (Hardback)
Språk
Engelska
Antal sidor
311
Utgivningsdatum
2017-12-18
Förlag
De Gruyter
Medarbetare
Tsinghua University Press (contributions)
Illustratör/Fotograf
10 Schwarz-Weiß-Tabellen 50 Schwarz-Weiß-Abbildungen
Illustrationer
10 Tables, black and white; 50 Illustrations, black and white
Dimensioner
244 x 175 x 23 mm
Vikt
726 g
Antal komponenter
1
Komponenter
,
ISBN
9783110476040

Trusted Computing

Principles and Applications

Inbunden,  Engelska, 2017-12-18
1853
  • Skickas från oss inom 7-10 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
Finns även som
Visa alla 1 format & utgåvor
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Visa hela texten

Passar bra ihop

  1. Trusted Computing
  2. +
  3. Before Crisis

De som köpt den här boken har ofta också köpt Before Crisis av Timothy Sellnow, Deanna Sellnow (häftad).

Köp båda 2 för 2397 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av Dengguo Feng

Övrig information

Dengguo Feng, Institute of Software, Chinese Academy of Sciences, Beijing, China

Innehållsförteckning

Table of Content: Chapter 1 Introduction 1.1 Latest development 1.2 Overview on credible terminal configuration, remote attestation, trusted network connect 1.3 Challenges 12 Chapter 2 Trusted platform module 2.1 Goal for module design 2.2 TPM security chip 2.3 TCM security chip 2.4 Mobile trusted module 2.5 Developments for new technologies - dynamic root credibility, virtual technology 2.6 Summary References Chapter 3 Configuration for chain of trust 3.1 Trusted root 3.2 Chain of trust 3.3 Static Chain of Trust 3.4 Dynamic chain of trust 3.5 Chain of trust in virtual platform 3.6 Summary References Chapter 4 Trusted software stack 4.1 Trusted software stack architecture and features 4.2 Trusted Software Stack interface 4.3 Applications 4.4 Open source software stack 4.5 Summary References Chapter 5 Trusted platform 5.1 Overview 5.2 For personal computer 5.3 Server 5.4 Trusted Mobile Platform 5.5 Virtualized trusted platform 5.6 Applications 5.7 Summary References Chapter 6 Assessment 6.1 Compliance test for trusted platform module 6.2 Security mechanisms for trusted computing and analysis 6.3 Trusted computing assessment and certification 6.4 Analysis for overall perfermance 6.5 Summary References Chapter 7 Remote attestation 7.1 Principles for remote attestation 7.2 Current studies on remote attestation 7.3 Platform identification 7.4 Binary-based remote attestation, attribute-based remote attestation 7.5 Systems and applications 7.6 Summary References Chapter 8 Trusted network connection 8.1 Background 8.2 Access and interfaces 8.3 Network extension - Trust@FHH 8.3.3ISCAS trusted network access system 8.4 Application 8.5 Summary References Appendix encryption algorithms and protocol