Trusted Computing : : Principles and Applications / / Dengguo Feng.
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter DG Plus DeG Package 2018 Part 1 |
---|---|
VerfasserIn: | |
MitwirkendeR: | |
Place / Publishing House: | Berlin ;, Boston : : De Gruyter, , [2017] ©2018 |
Year of Publication: | 2017 |
Language: | English |
Series: | Advances in Computer Science ,
2 |
Online Access: | |
Physical Description: | 1 online resource (XI, 300 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Other title: | Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index |
---|---|
Summary: | The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers. |
Format: | Mode of access: Internet via World Wide Web. |
ISBN: | 9783110477597 9783110762488 9783110719550 9783110540550 9783110625264 9783110547757 |
ISSN: | 2509-7253 ; |
DOI: | 10.1515/9783110477597 |
Access: | restricted access |
Hierarchical level: | Monograph |
Statement of Responsibility: | Dengguo Feng. |