Trusted Computing : : Principles and Applications / / Dengguo Feng.

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Plus DeG Package 2018 Part 1
VerfasserIn:
MitwirkendeR:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2017]
©2018
Year of Publication:2017
Language:English
Series:Advances in Computer Science , 2
Online Access:
Physical Description:1 online resource (XI, 300 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9783110477597
ctrlnum (DE-B1597)465996
(OCoLC)1020032345
collection bib_alma
record_format marc
spelling Feng, Dengguo, author. aut http://id.loc.gov/vocabulary/relators/aut
Trusted Computing : Principles and Applications / Dengguo Feng.
Berlin ; Boston : De Gruyter, [2017]
©2018
1 online resource (XI, 300 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Advances in Computer Science , 2509-7253 ; 2
Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 28. Feb 2023)
Information technology Management.
Information technology Security measures.
COMPUTERS / Security / Networking. bisacsh
Tsinghua University Press, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Title is part of eBook package: De Gruyter DG Plus DeG Package 2018 Part 1 9783110762488
Title is part of eBook package: De Gruyter DG Plus eBook-Package 2018 9783110719550
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2017 9783110540550 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE ENGLISH 2017 9783110625264
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2017 9783110547757 ZDB-23-DEI
EPUB 9783110476095
print 9783110476040
https://doi.org/10.1515/9783110477597
https://www.degruyter.com/isbn/9783110477597
Cover https://www.degruyter.com/document/cover/isbn/9783110477597/original
language English
format eBook
author Feng, Dengguo,
Feng, Dengguo,
spellingShingle Feng, Dengguo,
Feng, Dengguo,
Trusted Computing : Principles and Applications /
Advances in Computer Science ,
Frontmatter --
Preface --
Contents --
1. Introduction --
2. Trusted Platform Module --
3. Building Chain of Trust --
4. Trusted Software Stack --
5. Trusted Computing Platform --
6. Test and Evaluation of Trusted Computing --
7. Remote Attestation --
8. Trust Network Connection --
Appendix A: Foundations of Cryptography --
References --
Index
author_facet Feng, Dengguo,
Feng, Dengguo,
Tsinghua University Press,
Tsinghua University Press,
author_variant d f df
d f df
author_role VerfasserIn
VerfasserIn
author2 Tsinghua University Press,
Tsinghua University Press,
author2_variant t u p tup
t u p tup
author2_role MitwirkendeR
MitwirkendeR
author_sort Feng, Dengguo,
title Trusted Computing : Principles and Applications /
title_sub Principles and Applications /
title_full Trusted Computing : Principles and Applications / Dengguo Feng.
title_fullStr Trusted Computing : Principles and Applications / Dengguo Feng.
title_full_unstemmed Trusted Computing : Principles and Applications / Dengguo Feng.
title_auth Trusted Computing : Principles and Applications /
title_alt Frontmatter --
Preface --
Contents --
1. Introduction --
2. Trusted Platform Module --
3. Building Chain of Trust --
4. Trusted Software Stack --
5. Trusted Computing Platform --
6. Test and Evaluation of Trusted Computing --
7. Remote Attestation --
8. Trust Network Connection --
Appendix A: Foundations of Cryptography --
References --
Index
title_new Trusted Computing :
title_sort trusted computing : principles and applications /
series Advances in Computer Science ,
series2 Advances in Computer Science ,
publisher De Gruyter,
publishDate 2017
physical 1 online resource (XI, 300 p.)
Issued also in print.
contents Frontmatter --
Preface --
Contents --
1. Introduction --
2. Trusted Platform Module --
3. Building Chain of Trust --
4. Trusted Software Stack --
5. Trusted Computing Platform --
6. Test and Evaluation of Trusted Computing --
7. Remote Attestation --
8. Trust Network Connection --
Appendix A: Foundations of Cryptography --
References --
Index
isbn 9783110477597
9783110762488
9783110719550
9783110540550
9783110625264
9783110547757
9783110476095
9783110476040
issn 2509-7253 ;
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 T787 42018
url https://doi.org/10.1515/9783110477597
https://www.degruyter.com/isbn/9783110477597
https://www.degruyter.com/document/cover/isbn/9783110477597/original
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
doi_str_mv 10.1515/9783110477597
oclc_num 1020032345
work_keys_str_mv AT fengdengguo trustedcomputingprinciplesandapplications
AT tsinghuauniversitypress trustedcomputingprinciplesandapplications
status_str n
ids_txt_mv (DE-B1597)465996
(OCoLC)1020032345
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter DG Plus DeG Package 2018 Part 1
Title is part of eBook package: De Gruyter DG Plus eBook-Package 2018
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2017
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE ENGLISH 2017
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2017
is_hierarchy_title Trusted Computing : Principles and Applications /
container_title Title is part of eBook package: De Gruyter DG Plus DeG Package 2018 Part 1
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1806144419619930112
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04045nam a22008175i 4500</leader><controlfield tag="001">9783110477597</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230228123812.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230228t20172018gw fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110477597</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110477597</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)465996</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1020032345</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.T787 2018</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Feng, Dengguo, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted Computing :</subfield><subfield code="b">Principles and Applications /</subfield><subfield code="c">Dengguo Feng.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (XI, 300 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Computer Science ,</subfield><subfield code="x">2509-7253 ;</subfield><subfield code="v">2</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">1. Introduction -- </subfield><subfield code="t">2. Trusted Platform Module -- </subfield><subfield code="t">3. Building Chain of Trust -- </subfield><subfield code="t">4. Trusted Software Stack -- </subfield><subfield code="t">5. Trusted Computing Platform -- </subfield><subfield code="t">6. Test and Evaluation of Trusted Computing -- </subfield><subfield code="t">7. Remote Attestation -- </subfield><subfield code="t">8. Trust Network Connection -- </subfield><subfield code="t">Appendix A: Foundations of Cryptography -- </subfield><subfield code="t">References -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 28. Feb 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsinghua University Press, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus DeG Package 2018 Part 1</subfield><subfield code="z">9783110762488</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus eBook-Package 2018</subfield><subfield code="z">9783110719550</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2017</subfield><subfield code="z">9783110540550</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE ENGLISH 2017</subfield><subfield code="z">9783110625264</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2017</subfield><subfield code="z">9783110547757</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783110476095</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783110476040</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110477597</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783110477597</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9783110477597/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-062526-4 EBOOK PACKAGE COMPLETE ENGLISH 2017</subfield><subfield code="b">2017</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-071955-0 DG Plus eBook-Package 2018</subfield><subfield code="b">2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-076248-8 DG Plus DeG Package 2018 Part 1</subfield><subfield code="b">2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2017</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2017</subfield></datafield></record></collection>