Trusted Computing Principles and Applications

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.

Uložené v:
Podrobná bibliografia
Hlavný autor: Feng, Dengguo
Médium: E-kniha
Jazyk:English
Vydavateľské údaje: Germany De Gruyter 2017
Walter de Gruyter GmbH
Vydanie:1
Edícia:Advances in Computer Science
Predmet:
ISBN:9783110477597, 3110477599, 3110476045, 9783110476040
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.
AbstractList The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Author Feng, Dengguo
Author_xml – sequence: 1
  fullname: Feng, Dengguo
BookMark eNpl0MtLw0AQBvAVH2hrDx68ixfxUN3XZHePNdQHFLwUr8smmbS1SbbuJhb_e6sVpHqa-eDHBzM9ctD4Bgk5Z_SGAYNbo7RgjEqlwKg9MtjJ-3_yEekxyikVXEg4JoMYXymlnAkjQZyQs2noYovFRerrVdcumtkpOSxdFXHwM_vk5X48TR-Hk-eHp3Q0GTpJQZphiQqYlkbLnCdac5CYcCiLLFOMA4IzieIKNRSOUacz43hZACDPS1kgzUWfXG-LXVziOs591Ub7XmHm_TLanSN-7dpVLYYCZ6H72Cy2diH_Z6-2dhX8W4extd-VOTZtcJUd36WbJyqpv-TlVuYuumrRLGztGz8LbjWPFrgQiirxCZtZZ7M
ContentType eBook
DBID I4C
DEWEY 005
DOI 10.1515/9783110477597
DatabaseName Casalini Torrossa eBooks Institutional Catalogue
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783110477597
3110477599
9783110476095
3110476096
Edition 1
ExternalDocumentID 9783110477597
EBC5157487
5233707
GroupedDBID 20A
AABBV
AASNP
AAUSU
AAZEP
ABARN
ABHWV
ABONK
ABQPQ
ACISH
ACLGV
ADDXO
ADVEM
ADVQQ
ADZGP
AEAED
AEDVL
AEJQT
AEQJM
AERYV
AETUO
AEYCP
AFHFQ
AFOJC
AFRFP
AGBUF
AGIZT
AGLJD
AIUUY
AJFER
ALMA_UNASSIGNED_HOLDINGS
AMYDA
ARPAB
ARSQP
AZZ
BBABE
BFRBX
BHFIF
DLQEV
ECOWB
GEOUK
I4C
JJU
PQQKQ
QD8
AAGUP
AAHDW
AHRPT
AHWGJ
ID FETCH-LOGICAL-a40549-fe75184984c2688254e625fdbb7125e5a96727e85da10a8b9a2fd55e2cf4de0c3
ISBN 9783110477597
3110477599
3110476045
9783110476040
IngestDate Fri Nov 08 05:30:28 EST 2024
Fri Nov 21 20:07:21 EST 2025
Wed Dec 10 13:06:57 EST 2025
Wed Feb 19 02:54:44 EST 2025
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident Q
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a40549-fe75184984c2688254e625fdbb7125e5a96727e85da10a8b9a2fd55e2cf4de0c3
OCLC 1020032345
PQID EBC5157487
PageCount 314
ParticipantIDs askewsholts_vlebooks_9783110477597
walterdegruyter_marc_9783110477597
proquest_ebookcentral_EBC5157487
casalini_monographs_5233707
PublicationCentury 2000
PublicationDate 2017
[2017]
2017-12-18
PublicationDateYYYYMMDD 2017-01-01
2017-12-18
PublicationDate_xml – year: 2017
  text: 2017
PublicationDecade 2010
PublicationPlace Germany
PublicationPlace_xml – name: Germany
– name: Berlin/Boston
– name: Berlin
– name: Boston
PublicationSeriesTitle Advances in Computer Science
PublicationYear 2017
Publisher De Gruyter
Walter de Gruyter GmbH
Publisher_xml – name: De Gruyter
– name: Walter de Gruyter GmbH
RestrictionsOnAccess restricted access
SSID ssj0002139453
ssib034269623
ssib031096871
Score 2.0705671
Snippet The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses...
SourceID askewsholts
walterdegruyter
proquest
casalini
SourceType Aggregation Database
Publisher
SubjectTerms COM053000 COMPUTERS / Security / General
Computer programming, programs, data
Computer security
COMPUTERS / Information Technology
COMPUTERS / Security / Cryptography
COMPUTERS / Security / Networking
Information technology-Management
Information technology-Security measures
Subtitle Principles and Applications
TableOfContents Intro -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
References --
Contents --
4. Trusted Software Stack --
Appendix A: Foundations of Cryptography --
Preface --
1. Introduction --
Index
6. Test and Evaluation of Trusted Computing --
5. Trusted Computing Platform --
3. Building Chain of Trust --
7. Remote Attestation --
Frontmatter --
2. Trusted Platform Module --
8. Trust Network Connection --
Title Trusted Computing
URI http://digital.casalini.it/9783110477597
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5157487
https://www.degruyterbrill.com/isbn/9783110477597
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783110477597&uid=none
Volume 2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLfGyoEd2AZMlMIUTdyqQJvEiT2JwzY6kDaNHsa0W-Qk9jaBUtQ0o_z3e88fabJxgMMuaePIcfR-9vuw3wch7xXNsiRShS8o2CZRopTPMil9GmdCMkxwrqPeL06TszN2ecmntj5mpcsJJGXJlkv-61GhhjYAG0Nn_wPu5qXQAP8BdLgC7HC9pxE3t07s1Lh3OTSFGmwg89RtpptczAet8-qVFmjW-2f4vapnDbNEQ1zDidsJ17VoOXEYXoQ5kqtPB8aLQPvV5rZGxNAK1vaeAsipceBbNqgdQ2CCzus_zj_YWZvhGPM6JNQ41Dr2GfyVEVOds-Jhp25u687zJ6SHx8BgQfe-TL59P3FsIcRoW6eloYANQGuNKFboMJ1jUEtNLqXmfmTTqcJnfOwMskE2RPUD5AfIlkWFyoioBMagdiyM57-1r0IhrwwZWirH-RbpSYxD2SZrsnxBNl31Dc8y45fkg8Xba_De91Zoe4C210b7Fbk4npwfffVt9QtfgBIdcV9JPBKLOIvyIGZoyUswVlUBiwu0UkkFx1N0yWghxiPBMi4CVVAqg1xFhRzl4Q5ZL2elfE08oYDtMimAaiLiORdZmPEswIYiiQvVJ3stqqS3P_VJfZV2SNcnA0esFNaMyahepTQIw2QETz1Hv1T3ts7F6eTwCFBIwDCGUe7RNcV8Ld1R3vzLpwzIs9W0fUvWF_NaviNP89vFTTXftfPnDiJ2YhI
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Trusted+Computing%3A+Principles+and+Applications&rft.au=Feng%2C+Dengguo&rft.au=Press%2C+Tsinghua+University&rft.series=Advances+in+computer+science&rft.date=2017-12-18&rft.pub=De+Gruyter&rft.isbn=9783110477597&rft.volume=2&rft_id=info:doi/10.1515%2F9783110477597&rft.externalDocID=9783110477597
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.degruyterbrill.com%2Fdocument%2Fcover%2Fisbn%2F9783110477597%2Foriginal
http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97831104%2F9783110477597.jpg