Trusted Computing
Institution of Engineering and Technology (Verlag)
978-0-86341-525-8 (ISBN)
As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules.
This new text introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. It also includes application examples based on recent and ongoing research. The core of the book is based on an open workshop on Trusted Computing, held at Royal Holloway, University of London, UK.
Chris Mitchell is Professor of Computer Science at Royal Holloway. He helped establish the Information Security Group and the M.Sc in Information Security. He has been involved with a number of international projects, including the Mobile VCE Core 3 programme, the Mobile VCE Core 2 programme, four recent EU 5th Framework projects, and two EU ACTS projects on security for third generation mobile telecommunications systems. He is currently convenor of Technical Panel 2 of BSI IST/33 and is involved with ISO/IEC JTC1/SC27. Professor Mitchell has edited eight international security standards, authored six books, and published well over 150 research papers. He is academic editor of Computer and Communications Security Abstracts, and a member of the Editorial Advisory Board for the journals of the London Mathematical Society. He is a member of Microsoft's Trustworthy Computing Academic Advisory Board, and he continues to act as a consultant on a variety of topics in information security.
Chapter 1: What is trusted computing?
Chapter 2: Concepts of trusted computing
Chapter 3: An overview of trusted computing technology
Chapter 4: An overview of NGSCB
Chapter 5: The DAA scheme in context
Chapter 6: Single Sign-On using TCG-conformant platforms
Chapter 7: Secure delivery of conditional access applications to mobile receivers
Chapter 8: Enhancing user privacy using trusted computing
Chapter 9: Certificate management using distributed trusted third parties
Chapter 10: Securing peer-to-peer networks using trusted computing
Chapter 11: The future of trusted computing: an outlook
| Reihe/Serie | Computing and Networks |
|---|---|
| Verlagsort | Stevenage |
| Sprache | englisch |
| Maße | 156 x 234 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| ISBN-10 | 0-86341-525-3 / 0863415253 |
| ISBN-13 | 978-0-86341-525-8 / 9780863415258 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich