logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Trusted Computing 1st Edition by Dengguo Feng and others ISBN 3110476045 9783110476040

  • SKU: EBN-36661970
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.7

9 reviews
Instant download (eBook) Trusted Computing after payment.
Authors:Dengguo Feng and others
Pages:220 pages.
Year:2017
Editon:1
Publisher:De Gruyter
Language:english
File Size:2.14 MB
Format:pdf
ISBNS:9783110476040, 3110476045
Categories: Ebooks

Product desciption

(Ebook) Trusted Computing 1st Edition by Dengguo Feng and others ISBN 3110476045 9783110476040

(Ebook) Trusted Computing 1st Edition by Dengguo Feng and others - Ebook PDF Instant Download/Delivery: 3110476045, 9783110476040
Full download (Ebook) Trusted Computing 1st Edition after payment

Product details:

ISBN 10: 3110476045 
ISBN 13: 9783110476040
Author: Dengguo Feng and others

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

(Ebook) Trusted Computing 1st Table of contents:

1 Introduction
1.1 Related Work
1.1.1 Security Chip
1.1.2 Trust within a Terminal Platform
1.1.3 Trust between Platforms
1.1.4 Trust in Network
1.1.5 Test and Evaluation of Trusted Computing
1.2 Our Work
1.2.1 Chain of Trust
1.2.2 Remote Attestation
1.2.3 Trusted Network Connection
1.2.4 Application of Trusted Computing
1.2.5 Test and Evaluation of Trusted Computing
1.3 Problems and Challenges
1.4 Structure of This Book
2 Trusted Platform Module
2.1 Design Goals
2.2 TPM Security Chip
2.2.1 Introduction
2.2.2 Platform Data Protection
2.2.3 Identification
2.2.4 Integrity Storage and Reporting
2.2.5 Resource Protection
2.2.6 Auxiliary Functions
2.3 TCM Security Chip
2.3.1 Main Functionalities
2.3.2 Main Command Interfaces
2.4 Mobile Trusted Module
2.4.1 Main Features of MTM
2.4.2 MTM Functionalities and Commands
2.5 Developments of Related New Technologies
2.5.1 Dynamic Root of Trust for Measurement
2.5.2 Virtualization Technology
2.6 Summary
3 Building Chain of Trust
3.1 Root of Trust
3.1.1 Introduction of Root of Trust
3.1.2 Root of Trust for Measurement
3.1.3 Root of Trust for Storage and Reporting
3.2 Chain of Trust
3.2.1 The Proposal of Chain of Trust
3.2.2 Categories of Chain of Trust
3.2.3 Comparisons between Chains of Trust
3.3 Systems Based on Static Chain of Trust
3.3.1 Chain of Trust at Bootloader
3.3.2 Chain of Trust in OS
3.3.3 The ISCAS Chain of Trust
3.4 Systems Based on Dynamic Chain of Trust
3.4.1 Chain of Trust at Bootloader
3.4.2 Chain of Trust in OS
3.5 Chain of Trust for Virtualization Platforms
3.6 Summary
4 Trusted Software Stack
4.1 TSS Architecture and Functions
4.1.1 TSS Architecture
4.1.2 Trusted Device Driver
4.1.3 Trusted Device Driver Library
4.1.4 Trusted Core Services
4.1.5 Trusted Service Provider
4.2 TSS Interface
4.2.1 Object Type in TSM
4.2.2 TDDL Interface in TSM
4.2.3 TCS Interface in TSM
4.2.4 TSP Interface in TSM
4.3 Trusted Application Development
4.3.1 Calling Method of Interfaces
4.3.2 Example 1: File Encryption and Decryption
4.3.3 Example 2: Signature Verification in DRM
4.4 Open-Source TSS Implementation
4.4.1 TrouSerS
4.4.2 jTSS
4.4.3 μTSS
4.5 Summary
5 Trusted Computing Platform
5.1 Introduction
5.1.1 Development and Present Status
5.1.2 Basic Architecture
5.2 Personal Computer
5.2.1 Specification
5.2.2 Products and Applications
5.3 Server
5.3.1 Specification
5.3.2 Products and Applications
5.4 Trusted Mobile Platform
5.4.1 Specification
5.4.2 Generalized Architecture
5.4.3 Implementation of Trusted Mobile Platform
5.4.4 Applications
5.5 Virtualized Trusted Platform
5.5.1 Requirements and Specification
5.5.2 Generalized Architecture
5.5.3 Implementation of Virtualized Trusted Platform
5.5.4 Applications
5.6 Applications of Trusted Computing Platform
5.6.1 Data Protection
5.6.2 Security Authentication
5.6.3 System Security Enhancement
5.6.4 Trusted Cloud Services
5.6.5 Other Applications
5.7 Summary
6 Test and Evaluation of Trusted Computing
6.1 Compliance Test for TPM/TCM Specifications
6.1.1 Test Model
6.1.2 Test Method
6.1.3 Test Implementation
6.2 Analysis of Security Mechanism of Trusted Computing
6.2.1 Analysis Based on Model Checking
6.2.2 Analysis Based on Theorem Proving
6.3 Evaluation and Certification of Trusted Computing
6.3.1 Common Criteria
6.3.2 TPM and TNC Certification
6.4 Comprehensive Test and Analysis System of Trusted Computing Platform
6.4.1 Architecture and Functions of System
6.4.2 Compliance Test for TPM/TCM Specification
6.4.3 Tests of Cryptography Algorithms and Randoms
6.4.4 Simulation of Security Chip and Protocol
6.4.5 Promotion and Application
6.5 Summary
7 Remote Attestation
7.1 Remote Attestation Principle
7.1.1 Technology Foundation
7.1.2 Protocol Model
7.1.3 Interface Implementation
7.2 Comparison of Remote Attestation Researches
7.2.1 Attestation of Platform Identity
7.2.2 Attestation of Platform Integrity
7.3 Attestation of Platform Identity
7.3.1 Attestation of Platform Identity Based on Privacy CA
7.3.2 Direct Anonymous Attestation
7.3.3 Research Prospects
7.4 Attestation of Platform Integrity
7.4.1 Binary Remote Attestation
7.4.2 Property-Based Remote Attestation
7.4.3 Research Prospects
7.5 Remote Attestation System and Application
7.5.1 Remote Attestation System in Security PC
7.5.2 Integrity Verification Application on Mobile Platform
7.5.3 Remote Attestation Integrated with the TLS Protocol
7.6 Summary
8 Trust Network Connection
8.1 Background of TNC
8.1.1 Introduction to NAC
8.1.2 Commercial NAC Solutions
8.1.3 Defects of Current Solutions and TNC Motivation
8.2 Architecture and Principles of TNC
8.2.1 Standard Architecture
8.2.2 Overall Architecture
8.2.3 Workflow
8.2.4 The Advantages and Disadvantages of TNC
8.3 Research on Extension of TNC
8.3.1 Overview of the TNC Research
8.3.2 Trust@FHH
8.3.3 ISCAS Trusted Network Connection System
8.4 Application of Trusted Network Connection
8.5 Summary

People also search for (Ebook) Trusted Computing 1st:

    
trusted computing book
    
trusted computing pdf
    
trusted computing environment
    
trusted computing base (tcb)
    
trusted computing group dice
    
facebook trusted devices

 

 

Tags: Dengguo Feng and others, Trusted, Computing

*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products