Cargando…

Trusted platform module basics : using TPM in embedded systems /

Intended for embedded designers, this book provides a foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards. It covers the TPM basics, discussing the TPM Key Hierarchy and the Trusted Platform Module specification. It also includes an accompanying...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kinney, Steven
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford : Newnes, 2006.
Colección:Embedded technology series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocm85815077
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 070308s2006 enk ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCF  |d OCLCO  |d OCLCQ  |d OPELS  |d BAKER  |d OKU  |d OCLCQ  |d AGLDB  |d LIV  |d OCLCA  |d D6H  |d OCLCQ  |d VTS  |d VT2  |d OCLCQ  |d COO  |d WYU  |d STF  |d LEAUB  |d M8D  |d UKCRE  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
019 |a 162130420  |a 856952260  |a 1055398534  |a 1066535216  |a 1081218510  |a 1148120709 
020 |a 9780080465166  |q (electronic bk.) 
020 |a 0080465161  |q (electronic bk.) 
020 |a 9780750679602 
020 |a 0750679603 
020 |a 9780750679527 
020 |a 0750679522 
029 1 |a AU@  |b 000051860379 
029 1 |a AU@  |b 000054161685 
029 1 |a CHBIS  |b 005678143 
029 1 |a CHNEW  |b 001004976 
029 1 |a CHVBK  |b 16718217X 
029 1 |a DEBBG  |b BV043148354 
029 1 |a DEBSZ  |b 367755726 
029 1 |a DEBSZ  |b 422245496 
029 1 |a GBVCP  |b 802253253 
029 1 |a NZ1  |b 12434540 
035 |a (OCoLC)85815077  |z (OCoLC)162130420  |z (OCoLC)856952260  |z (OCoLC)1055398534  |z (OCoLC)1066535216  |z (OCoLC)1081218510  |z (OCoLC)1148120709 
037 |a 115425:115520  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK7895.E42  |b K56 2006eb 
072 7 |a COM  |x 050020  |2 bisacsh 
072 7 |a COM  |x 050010  |2 bisacsh 
082 0 4 |a 621.3916  |2 22 
049 |a UAMI 
100 1 |a Kinney, Steven. 
245 1 0 |a Trusted platform module basics :  |b using TPM in embedded systems /  |c Steven L. Kinney. 
260 |a Oxford :  |b Newnes,  |c 2006. 
300 |a 1 online resource (xv, 352 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Embedded technology series 
588 0 |a Print version record. 
520 |a Intended for embedded designers, this book provides a foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards. It covers the TPM basics, discussing the TPM Key Hierarchy and the Trusted Platform Module specification. It also includes an accompanying CD-ROM that contains source code. 
505 0 |a TCG prerequisites -- Cryptographic basics -- Overview of the TPM architecture -- Root-of-trust, the TPM endorsement key -- Key hierarchy and key management -- Platform configuration registers -- TPM command message overview -- Rolling nonces and anti-replay protection -- Command authorization, typical -- Command authorization, atypical -- The initialization and low-level command suite -- Compliance vectors and their purpose -- Establishing a TPM owner -- Owner-authorized command suite -- The key management command suite -- The RSA encryption and decryption command suite -- The TPM signature command -- The RNG command suite -- The PCR command suite -- The TPM capability and self-test command suite -- The key migration and secret management suite -- The trusted device driver -- TPM system deployment initialization -- Migrating to version 1.2 of the TPM -- Example one : TPM ownership -- More command examples. 
504 |a Includes bibliographical references and index. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Embedded computer systems. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Systèmes enfouis (Informatique) 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Hardware  |x Personal Computers  |x Macintosh.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x Personal Computers  |x PCs.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Embedded computer systems  |2 fast 
758 |i has work:  |a Trusted platform module basics (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGpMfkDcVvYYHKhMwMhF4y  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Kinney, Steven.  |t Trusted platform module basics.  |d Oxford : Newnes, 2006  |z 9780750679602  |z 0750679603  |w (OCoLC)67871952 
830 0 |a Embedded technology series. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=274719  |z Texto completo 
938 |a Baker & Taylor  |b BKTY  |c 59.95  |d 59.95  |i 0750679603  |n 0006733842  |s active 
938 |a EBSCOhost  |b EBSC  |n 173590 
938 |a YBP Library Services  |b YANK  |n 2532247 
994 |a 92  |b IZTAP