Trusted Computing

Capa
Chris Mitchell
IET, 9 de nov. de 2005 - 313 páginas
As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules.
 

Páginas selecionadas

Conteúdo

1 What is trusted computing?
1
2 Concepts of trusted computing
11
3 An overview of trusted computing technology
29
4 An overview of NGSCB
115
5 The DAA scheme in context
143
6 Single SignOn using TCGconformant platforms
175
7 Secure delivery of conditional access applications to mobile receivers
195
8 Enhancing user privacy using trusted computing
239
9 Certificate management using distributed trusted third parties
251
10 Securing peertopeer networks using trusted computing
271
an outlook
299
References
303
Index
305
Direitos autorais

Outras edições - Ver todos

Termos e frases comuns

Informações bibliográficas