Cargando…

Bootstrapping Trust in Modern Computers

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving securit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Parno, Bryan (Autor), McCune, Jonathan M. (Autor), Perrig, Adrian (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer New York : Imprint: Springer, 2011.
Edición:1st ed. 2011.
Colección:SpringerBriefs in Computer Science,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4614-1460-5
003 DE-He213
005 20220112115311.0
007 cr nn 008mamaa
008 110825s2011 xxu| s |||| 0|eng d
020 |a 9781461414605  |9 978-1-4614-1460-5 
024 7 |a 10.1007/978-1-4614-1460-5  |2 doi 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
100 1 |a Parno, Bryan.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Bootstrapping Trust in Modern Computers  |h [electronic resource] /  |c by Bryan Parno, Jonathan M. McCune, Adrian Perrig. 
250 |a 1st ed. 2011. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2011. 
300 |a IX, 101 p. 10 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Computer Science,  |x 2191-5776 
520 |a Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security. 
650 0 |a Computer networks . 
650 0 |a Information storage and retrieval systems. 
650 0 |a Database management. 
650 1 4 |a Computer Communication Networks. 
650 2 4 |a Information Storage and Retrieval. 
650 2 4 |a Database Management. 
700 1 |a McCune, Jonathan M.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Perrig, Adrian.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781461414599 
776 0 8 |i Printed edition:  |z 9781461414612 
830 0 |a SpringerBriefs in Computer Science,  |x 2191-5776 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4614-1460-5  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)