Trusted Computing Principles and Applications
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.
Saved in:
| Main Author: | |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Germany
De Gruyter
2017
Walter de Gruyter GmbH |
| Edition: | 1 |
| Series: | Advances in Computer Science |
| Subjects: | |
| ISBN: | 9783110477597, 3110477599, 3110476045, 9783110476040 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Intro -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
- References --
- Contents --
- 4. Trusted Software Stack --
- Appendix A: Foundations of Cryptography --
- Preface --
- 1. Introduction --
- Index
- 6. Test and Evaluation of Trusted Computing --
- 5. Trusted Computing Platform --
- 3. Building Chain of Trust --
- 7. Remote Attestation --
- Frontmatter --
- 2. Trusted Platform Module --
- 8. Trust Network Connection --

