Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама



Название: Trusted Computing: Principles and Applications
Автор: Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao
Издательство: De Gruyter
Серия: Advances in Computer Science
ISBN: 3110476045
Год: 2018
Страниц: 230
Язык: английский
Формат: pdf (true), epub
Размер: 18.6 MB

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

With further development of computer network, the three most prominent threats are gradually highlighted, including attacks from malicious code, illegal stealing of information and illegal corruption of data and system. Within these threats, attacks from malicious code have surpassed traditional computer virus to be the predominant threat to private information of computer users. These threats originate from the situation that computer architecture lacks an immune system against malicious code. Thus, it is a core issue to accommodate immune system in computer architecture and ensure a computer platform to run securely and trustworthily.

Trusted computing is a kind of technique proposed under this background. By establishing a mechanism of integrity measurement, trusted computing enables computing platforms to distinguish between trusted programs and untrusted programs. In this way, computing platforms employ reliable countermeasures to prevent untrusted programs from disrupting.

This book includes eight chapters. Chapter 1 is introduction. We introduce the research background, development status of technique and our contributions. Chapter 2 introduces trusted platform module, including TPM, TCM and MTM (Mobile Trusted Module). Chapter 3 focuses on establishing techniques of chain of trust, including root of trust, systems based on static and dynamic chain of trust and chain of trust in virtualization platforms. Chapter 4 discusses trusted software stack, including TSS (TCG Software Stack), TSM (TCM Service Module) and development of trusted application. Chapter 5 describes trusted computing platform, such as PC, server, trusted mobile platform, trusted virtualized platform and applications of trusted computing platform. Chapter 6 introduces test and evaluation of trusted computing, including test and evaluation of trusted platform module, analysis of trusted computing security mechanism, certification and evaluation of trusted computing and comprehensive test and analysis system of trusted computing platform. Chapter 7 introduces remote attestation, and Chapter 8 proposes trusted network connection.

Скачать Trusted Computing: Principles and Applications







ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!







Автор: Ingvar16 22-05-2018, 13:49 | Напечатать |
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.





С этой публикацией часто скачивают:

Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.


 MirKnig.Su  ©2024     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности