ISBN-13: 9783110476040 / Angielski / Twarda / 2017 / 311 str.
Table of Content:Chapter 1 Introduction1.1 Latest development1.2 Overview on credible terminal configuration, remote attestation, trusted network connect1.3 Challenges 12Chapter 2 Trusted platform module2.1 Goal for module design2.2 TPM security chip2.3 TCM security chip2.4 Mobile trusted module2.5 Developments for new technologies - dynamic root credibility, virtual technology2.6 SummaryReferencesChapter 3 Configuration for chain of trust3.1 Trusted root3.2 Chain of trust3.3 Static Chain of Trust3.4 Dynamic chain of trust3.5 Chain of trust in virtual platform3.6 SummaryReferencesChapter 4 Trusted software stack4.1 Trusted software stack architecture and features4.2 Trusted Software Stack interface4.3 Applications4.4 Open source software stack4.5 SummaryReferencesChapter 5 Trusted platform5.1 Overview5.2 For personal computer5.3 Server5.4 Trusted Mobile Platform5.5 Virtualized trusted platform5.6 Applications5.7 SummaryReferencesChapter 6 Assessment6.1 Compliance test for trusted platform module6.2 Security mechanisms for trusted computing and analysis6.3 Trusted computing assessment and certification6.4 Analysis for overall perfermance6.5 SummaryReferencesChapter 7 Remote attestation7.1 Principles for remote attestation7.2 Current studies on remote attestation7.3 Platform identification7.4 Binary-based remote attestation, attribute-based remote attestation7.5 Systems and applications7.6 SummaryReferencesChapter 8 Trusted network connection8.1 Background8.2 Access and interfaces8.3 Network extension - Trust@FHH8.3.3ISCAS trusted network access system8.4 Application8.5 SummaryReferencesAppendix - encryption algorithms and protocol
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, Beijing, China
Czytaj nas na: