Trusted Computing Platforms Design and Applications /
How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial efforts have advanced the notion of a "trusted computing platform" as a building block. Through a conspiracy of hardwar...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Autor Corporativo: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Motivating Scenarios
- Attacks
- Foundations
- Design Challenges
- Platform Architecture
- Outbound Authentication
- Validation
- Application Case Studies
- TCPA/TCG
- Experimenting with TCPA/TCG
- New Horizons.