Trusted Computing Principles and Applications

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections.

Uložené v:
Podrobná bibliografia
Hlavný autor: Feng, Dengguo
Médium: E-kniha
Jazyk:English
Vydavateľské údaje: Germany De Gruyter 2017
Walter de Gruyter GmbH
Vydanie:1
Edícia:Advances in Computer Science
Predmet:
ISBN:9783110477597, 3110477599, 3110476045, 9783110476040
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Obsah:
  • Intro -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
  • References --
  • Contents --
  • 4. Trusted Software Stack --
  • Appendix A: Foundations of Cryptography --
  • Preface --
  • 1. Introduction --
  • Index
  • 6. Test and Evaluation of Trusted Computing --
  • 5. Trusted Computing Platform --
  • 3. Building Chain of Trust --
  • 7. Remote Attestation --
  • Frontmatter --
  • 2. Trusted Platform Module --
  • 8. Trust Network Connection --