Trusted ComputingChris Mitchell IET, 9 de nov. de 2005 - 313 páginas As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules. |
Conteúdo
1 What is trusted computing? | 1 |
2 Concepts of trusted computing | 11 |
3 An overview of trusted computing technology | 29 |
4 An overview of NGSCB | 115 |
5 The DAA scheme in context | 143 |
6 Single SignOn using TCGconformant platforms | 175 |
7 Secure delivery of conditional access applications to mobile receivers | 195 |
8 Enhancing user privacy using trusted computing | 239 |
9 Certificate management using distributed trusted third parties | 251 |
10 Securing peertopeer networks using trusted computing | 271 |
an outlook | 299 |
References | 303 |
305 | |
Outras edições - Ver todos
Termos e frases comuns
access control anonymity applet application architecture asymmetric key attacks attestation authentication authorisation data CA-applet Chapter command components computing platform conditional access systems confidentiality and integrity credential cryptographic DAA certificate decrypted device drivers digital signatures Direct anonymous attestation encryption key entity example execution environment functionality hardware hash HMAC identity implementation input integrity protection isolation kernel issuer issues key pair machine mechanisms memory microkernel migration NGSCB nonce operating system P2P networks particular PCR values peers physical private key protocol pseudonyms public key random roots of trust running secret key security kernel session signature scheme signing smart card software provider SSO scheme static key storage stored symmetric TCG specifications third party TPM owner Trusted Computing Group Trusted Platform Module trusted platforms trustworthy user’s verifier version 1.2
Referências a este livro
Trusted Computing - Challenges and Applications: First International ... Peter Lipp,Ahmad-Reza Sadeghi Visualização parcial - 2008 |