Feng, Dengguo,
Trusted Computing : Principles and Applications / Dengguo Feng. - 1 online resource (XI, 300 p.) - Advances in Computer Science , 2 2509-7253 ; .
Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
restricted access http://purl.org/coar/access_right/c_16ec
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Mode of access: Internet via World Wide Web.
In English.
9783110477597
10.1515/9783110477597 doi
Information technology--Management.
Information technology--Security measures.
COMPUTERS / Security / Networking.
QA76.9.A25 / .T787 2018
005.8
Trusted Computing : Principles and Applications / Dengguo Feng. - 1 online resource (XI, 300 p.) - Advances in Computer Science , 2 2509-7253 ; .
Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
restricted access http://purl.org/coar/access_right/c_16ec
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Mode of access: Internet via World Wide Web.
In English.
9783110477597
10.1515/9783110477597 doi
Information technology--Management.
Information technology--Security measures.
COMPUTERS / Security / Networking.
QA76.9.A25 / .T787 2018
005.8