Trusted Computing Principles and Applications
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.
Uložené v:
| Hlavný autor: | |
|---|---|
| Médium: | E-kniha |
| Jazyk: | English |
| Vydavateľské údaje: |
Germany
De Gruyter
2017
Walter de Gruyter GmbH |
| Vydanie: | 1 |
| Edícia: | Advances in Computer Science |
| Predmet: | |
| ISBN: | 9783110477597, 3110477599, 3110476045, 9783110476040 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. |
|---|---|
| AbstractList | The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers. |
| Author | Feng, Dengguo |
| Author_xml | – sequence: 1 fullname: Feng, Dengguo |
| BookMark | eNpl0MtLw0AQBvAVH2hrDx68ixfxUN3XZHePNdQHFLwUr8smmbS1SbbuJhb_e6sVpHqa-eDHBzM9ctD4Bgk5Z_SGAYNbo7RgjEqlwKg9MtjJ-3_yEekxyikVXEg4JoMYXymlnAkjQZyQs2noYovFRerrVdcumtkpOSxdFXHwM_vk5X48TR-Hk-eHp3Q0GTpJQZphiQqYlkbLnCdac5CYcCiLLFOMA4IzieIKNRSOUacz43hZACDPS1kgzUWfXG-LXVziOs591Ub7XmHm_TLanSN-7dpVLYYCZ6H72Cy2diH_Z6-2dhX8W4extd-VOTZtcJUd36WbJyqpv-TlVuYuumrRLGztGz8LbjWPFrgQiirxCZtZZ7M |
| ContentType | eBook |
| DBID | I4C |
| DEWEY | 005 |
| DOI | 10.1515/9783110477597 |
| DatabaseName | Casalini Torrossa eBooks Institutional Catalogue |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9783110477597 3110477599 9783110476095 3110476096 |
| Edition | 1 |
| ExternalDocumentID | 9783110477597 EBC5157487 5233707 |
| GroupedDBID | 20A AABBV AASNP AAUSU AAZEP ABARN ABHWV ABONK ABQPQ ACISH ACLGV ADDXO ADVEM ADVQQ ADZGP AEAED AEDVL AEJQT AEQJM AERYV AETUO AEYCP AFHFQ AFOJC AFRFP AGBUF AGIZT AGLJD AIUUY AJFER ALMA_UNASSIGNED_HOLDINGS AMYDA ARPAB ARSQP AZZ BBABE BFRBX BHFIF DLQEV ECOWB GEOUK I4C JJU PQQKQ QD8 AAGUP AAHDW AHRPT AHWGJ |
| ID | FETCH-LOGICAL-a40549-fe75184984c2688254e625fdbb7125e5a96727e85da10a8b9a2fd55e2cf4de0c3 |
| ISBN | 9783110477597 3110477599 3110476045 9783110476040 |
| IngestDate | Fri Nov 08 05:30:28 EST 2024 Fri Nov 21 20:07:21 EST 2025 Wed Dec 10 13:06:57 EST 2025 Wed Feb 19 02:54:44 EST 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum_Ident | Q |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a40549-fe75184984c2688254e625fdbb7125e5a96727e85da10a8b9a2fd55e2cf4de0c3 |
| OCLC | 1020032345 |
| PQID | EBC5157487 |
| PageCount | 314 |
| ParticipantIDs | askewsholts_vlebooks_9783110477597 walterdegruyter_marc_9783110477597 proquest_ebookcentral_EBC5157487 casalini_monographs_5233707 |
| PublicationCentury | 2000 |
| PublicationDate | 2017 [2017] 2017-12-18 |
| PublicationDateYYYYMMDD | 2017-01-01 2017-12-18 |
| PublicationDate_xml | – year: 2017 text: 2017 |
| PublicationDecade | 2010 |
| PublicationPlace | Germany |
| PublicationPlace_xml | – name: Germany – name: Berlin/Boston – name: Berlin – name: Boston |
| PublicationSeriesTitle | Advances in Computer Science |
| PublicationYear | 2017 |
| Publisher | De Gruyter Walter de Gruyter GmbH |
| Publisher_xml | – name: De Gruyter – name: Walter de Gruyter GmbH |
| RestrictionsOnAccess | restricted access |
| SSID | ssj0002139453 ssib034269623 ssib031096871 |
| Score | 2.0705671 |
| Snippet | The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses... |
| SourceID | askewsholts walterdegruyter proquest casalini |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | COM053000 COMPUTERS / Security / General Computer programming, programs, data Computer security COMPUTERS / Information Technology COMPUTERS / Security / Cryptography COMPUTERS / Security / Networking Information technology-Management Information technology-Security measures |
| Subtitle | Principles and Applications |
| TableOfContents | Intro -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index References -- Contents -- 4. Trusted Software Stack -- Appendix A: Foundations of Cryptography -- Preface -- 1. Introduction -- Index 6. Test and Evaluation of Trusted Computing -- 5. Trusted Computing Platform -- 3. Building Chain of Trust -- 7. Remote Attestation -- Frontmatter -- 2. Trusted Platform Module -- 8. Trust Network Connection -- |
| Title | Trusted Computing |
| URI | http://digital.casalini.it/9783110477597 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5157487 https://www.degruyterbrill.com/isbn/9783110477597 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783110477597&uid=none |
| Volume | 2 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLfGyoEd2AZMlMIUTdyqQJvEiT2JwzY6kDaNHsa0W-Qk9jaBUtQ0o_z3e88fabJxgMMuaePIcfR-9vuw3wch7xXNsiRShS8o2CZRopTPMil9GmdCMkxwrqPeL06TszN2ecmntj5mpcsJJGXJlkv-61GhhjYAG0Nn_wPu5qXQAP8BdLgC7HC9pxE3t07s1Lh3OTSFGmwg89RtpptczAet8-qVFmjW-2f4vapnDbNEQ1zDidsJ17VoOXEYXoQ5kqtPB8aLQPvV5rZGxNAK1vaeAsipceBbNqgdQ2CCzus_zj_YWZvhGPM6JNQ41Dr2GfyVEVOds-Jhp25u687zJ6SHx8BgQfe-TL59P3FsIcRoW6eloYANQGuNKFboMJ1jUEtNLqXmfmTTqcJnfOwMskE2RPUD5AfIlkWFyoioBMagdiyM57-1r0IhrwwZWirH-RbpSYxD2SZrsnxBNl31Dc8y45fkg8Xba_De91Zoe4C210b7Fbk4npwfffVt9QtfgBIdcV9JPBKLOIvyIGZoyUswVlUBiwu0UkkFx1N0yWghxiPBMi4CVVAqg1xFhRzl4Q5ZL2elfE08oYDtMimAaiLiORdZmPEswIYiiQvVJ3stqqS3P_VJfZV2SNcnA0esFNaMyahepTQIw2QETz1Hv1T3ts7F6eTwCFBIwDCGUe7RNcV8Ld1R3vzLpwzIs9W0fUvWF_NaviNP89vFTTXftfPnDiJ2YhI |
| linkProvider | ProQuest Ebooks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Trusted+Computing%3A+Principles+and+Applications&rft.au=Feng%2C+Dengguo&rft.au=Press%2C+Tsinghua+University&rft.series=Advances+in+computer+science&rft.date=2017-12-18&rft.pub=De+Gruyter&rft.isbn=9783110477597&rft.volume=2&rft_id=info:doi/10.1515%2F9783110477597&rft.externalDocID=9783110477597 |
| thumbnail_m | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.degruyterbrill.com%2Fdocument%2Fcover%2Fisbn%2F9783110477597%2Foriginal http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97831104%2F9783110477597.jpg |

