Trusted Computing :Principles and Applications ( Advances in Computer Science )

Publication subTitle :Principles and Applications

Publication series : Advances in Computer Science

Author: Feng Dengguo;Press Tsinghua University  

Publisher: De Gruyter‎

Publication year: 2017

E-ISBN: 9783110477597

P-ISBN(Paperback): 9783110476040

Subject: TP309 安全保密

Keyword: 计算机网络,安全保密,计算技术、计算机技术

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Chapter

3. Building Chain of Trust

4. Trusted Software Stack

5. Trusted Computing Platform

6. Test and Evaluation of Trusted Computing

7. Remote Attestation

8. Trust Network Connection

Appendix A: Foundations of Cryptography

References

Index

The users who browse this book also browse