Trusted Computing : Principles and Applications

Posted By: readerXXI

Trusted Computing : Principles and Applications
by Dengguo Feng and Yu Qin
English | 2018 | ISBN: 3110476045 | 220 Pages | ePUB | 16 MB

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

This book includes eight chapters. Chapter 1 is introduction. We introduce the research background, development status of technique and our contributions. Chapter 2 introduces trusted platform module, including TPM, TCM and MTM (Mobile Trusted Module). Chapter 3 focuses on establishing techniques of chain of trust, including root of trust, systems based on static and dynamic chain of trust and chain of trust in virtualization platforms. Chapter 4 discusses trusted software stack, including TSS (TCG Software Stack), TSM (TCM Service Module) and development of trusted application. Chapter 5 describes trusted computing platform, such as PC, server, trusted mobile platform, trusted virtualized platform and applications of trusted computing platform. Chapter 6 introduces test and evaluation of trusted computing, including test and evaluation of trusted platform module, analysis of trusted computing security mechanism, certification and evaluation of trusted computing and comprehensive test and analysis system of trusted computing platform. Chapter 7 introduces remote attestation, and Chapter 8 proposes trusted network connection.