02511nam 2200553 450 991080934580332120200923020339.03-11-047609-610.1515/9783110477597(CKB)4100000001502354(DE-B1597)465996(OCoLC)1020032345(DE-B1597)9783110477597(Au-PeEL)EBL5157487(CaPaEBR)ebr11497586(CaSebORM)9783110476095(MiAaPQ)EBC5157487(EXLCZ)99410000000150235420180206h20182018 uy 0engurcnu||||||||rdacontentrdamediardacarrierTrusted computing principles and applications /Dengguo Feng [and three others]Berlin, [Germany] ;Boston, [Massachusetts] :De Gruyter :Tsinghua University Press,2018.©20181 online resource (314 pages) illustrationsAdvances in Computer Science,2509-7253 ;Volume 23-11-047604-5 3-11-047759-9 Includes bibliographical references and index.Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- IndexThe book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.Advances in computer science ;Volume 2.Information technologySecurity measuresInformation technologyManagementInformation technologySecurity measures.Information technologyManagement.005.8Feng Dengguo997280Feng DengguoMiAaPQMiAaPQMiAaPQBOOK9910809345803321Trusted computing4017327UNINA