Название: Trusted Computing: Principles and Applications Автор: Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao Издательство: De Gruyter Серия: Advances in Computer Science ISBN: 3110476045 Год: 2018 Страниц: 230 Язык: английский Формат: pdf (true), epub Размер: 18.6 MB
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
With further development of computer network, the three most prominent threats are gradually highlighted, including attacks from malicious code, illegal stealing of information and illegal corruption of data and system. Within these threats, attacks from malicious code have surpassed traditional computer virus to be the predominant threat to private information of computer users. These threats originate from the situation that computer architecture lacks an immune system against malicious code. Thus, it is a core issue to accommodate immune system in computer architecture and ensure a computer platform to run securely and trustworthily.
Trusted computing is a kind of technique proposed under this background. By establishing a mechanism of integrity measurement, trusted computing enables computing platforms to distinguish between trusted programs and untrusted programs. In this way, computing platforms employ reliable countermeasures to prevent untrusted programs from disrupting.
This book includes eight chapters. Chapter 1 is introduction. We introduce the research background, development status of technique and our contributions. Chapter 2 introduces trusted platform module, including TPM, TCM and MTM (Mobile Trusted Module). Chapter 3 focuses on establishing techniques of chain of trust, including root of trust, systems based on static and dynamic chain of trust and chain of trust in virtualization platforms. Chapter 4 discusses trusted software stack, including TSS (TCG Software Stack), TSM (TCM Service Module) and development of trusted application. Chapter 5 describes trusted computing platform, such as PC, server, trusted mobile platform, trusted virtualized platform and applications of trusted computing platform. Chapter 6 introduces test and evaluation of trusted computing, including test and evaluation of trusted platform module, analysis of trusted computing security mechanism, certification and evaluation of trusted computing and comprehensive test and analysis system of trusted computing platform. Chapter 7 introduces remote attestation, and Chapter 8 proposes trusted network connection.
Скачать Trusted Computing: Principles and Applications
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
С этой публикацией часто скачивают:
Fog and Edge Computing: Principles and Paradigms Название: Fog and Edge Computing: Principles and Paradigms Автор: Rajkumar Buyya Издательство: Wiley Год: 2019 Страниц: 480 Формат: PDF Размер: 10 Mb...
Assured Cloud Computing Название: Assured Cloud Computing Автор: Roy H. Campbell and Charles A. Kamhoua Издательство: Wiley Год: 2018 Формат: PDF Размер: 15 Мб Язык:...
Advances of DNA Computing in Cryptography Название: Advances of DNA Computing in Cryptography Автор: Suyel Namasudra Издательство: Chapman and Hall/CRC Год: 2019 Страниц: 197 Формат: PDF...
Applied Computing and Information Technology Название: Applied Computing and Information Technology Автор: Roger Lee Издательство: Springer ISBN: 3319983695 Год: 2018 (2019 Edition) Страниц:...
Great Principles of Computing Название: Great Principles of Computing Автор: Peter J. Denning,? Craig H. Martell Издательство: The MIT Press Год: 2015 Страниц: 320 Формат: True...