Trusted Computing Principles and Applications

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.

Uloženo v:
Podrobná bibliografie
Hlavní autor: Feng, Dengguo
Médium: E-kniha
Jazyk:angličtina
Vydáno: Germany De Gruyter 2017
Walter de Gruyter GmbH
Vydání:1
Edice:Advances in Computer Science
Témata:
ISBN:9783110477597, 3110477599, 3110476045, 9783110476040
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Obsah:
  • Intro -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
  • References --
  • Contents --
  • 4. Trusted Software Stack --
  • Appendix A: Foundations of Cryptography --
  • Preface --
  • 1. Introduction --
  • Index
  • 6. Test and Evaluation of Trusted Computing --
  • 5. Trusted Computing Platform --
  • 3. Building Chain of Trust --
  • 7. Remote Attestation --
  • Frontmatter --
  • 2. Trusted Platform Module --
  • 8. Trust Network Connection --