Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Trusted Computing : Principles and Applications

    Posted By: readerXXI
    Trusted Computing : Principles and Applications

    Trusted Computing : Principles and Applications
    by Dengguo Feng and Yu Qin
    English | 2018 | ISBN: 3110476045 | 220 Pages | ePUB | 16 MB

    The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

    This book includes eight chapters. Chapter 1 is introduction. We introduce the research background, development status of technique and our contributions. Chapter 2 introduces trusted platform module, including TPM, TCM and MTM (Mobile Trusted Module). Chapter 3 focuses on establishing techniques of chain of trust, including root of trust, systems based on static and dynamic chain of trust and chain of trust in virtualization platforms. Chapter 4 discusses trusted software stack, including TSS (TCG Software Stack), TSM (TCM Service Module) and development of trusted application. Chapter 5 describes trusted computing platform, such as PC, server, trusted mobile platform, trusted virtualized platform and applications of trusted computing platform. Chapter 6 introduces test and evaluation of trusted computing, including test and evaluation of trusted platform module, analysis of trusted computing security mechanism, certification and evaluation of trusted computing and comprehensive test and analysis system of trusted computing platform. Chapter 7 introduces remote attestation, and Chapter 8 proposes trusted network connection.