Trusted Computing : Principles and Applications.
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Other Authors: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Berlin/Boston :
De Gruyter,
2017.
|
Series: | Advances in computer science.
|
Subjects: | |
Online Access: | Texto completo |
Table of Contents:
- Intro; Preface; Contents; 1. Introduction; 2. Trusted Platform Module; 3. Building Chain of Trust; 4. Trusted Software Stack; 5. Trusted Computing Platform; 6. Test and Evaluation of Trusted Computing; 7. Remote Attestation; 8. Trust Network Connection; Appendix A: Foundations of Cryptography; References; Index.