Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Trusted Computing

Principles and Applications
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9783110477597
Veröffentl:
2017
Seiten:
311
Autor:
Dengguo Feng
Serie:
Advances in Computer Science
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Table of Content:Chapter 1 Introduction1.1 Latest development1.2 Overview on credible terminal configuration, remote attestation, trusted network connect1.3 Challenges 12Chapter 2 Trusted platform module2.1 Goal for module design2.2 TPM security chip2.3 TCM security chip2.4 Mobile trusted module2.5 Developments for new technologies - dynamic root credibility, virtual technology2.6 SummaryReferencesChapter 3 Configuration for chain of trust3.1 Trusted root3.2 Chain of trust3.3 Static Chain of Trust3.4 Dynamic chain of trust3.5 Chain of trust in virtual platform3.6 SummaryReferencesChapter 4 Trusted software stack4.1 Trusted software stack architecture and features4.2 Trusted Software Stack interface4.3 Applications4.4 Open source software stack4.5 SummaryReferencesChapter 5 Trusted platform5.1 Overview5.2 For personal computer5.3 Server5.4 Trusted Mobile Platform5.5 Virtualized trusted platform5.6 Applications5.7 SummaryReferencesChapter 6 Assessment6.1 Compliance test for trusted platform module6.2 Security mechanisms for trusted computing and analysis6.3 Trusted computing assessment and certification6.4 Analysis for overall perfermance6.5 SummaryReferencesChapter 7 Remote attestation7.1 Principles for remote attestation7.2 Current studies on remote attestation7.3 Platform identification7.4 Binary-based remote attestation, attribute-based remote attestation7.5 Systems and applications7.6 SummaryReferencesChapter 8 Trusted network connection8.1 Background8.2 Access and interfaces8.3 Network extension - Trust@FHH8.3.3ISCAS trusted network access system8.4 Application8.5 SummaryReferencesAppendix - encryption algorithms and protocol

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga