Trust extension as a mechanism for secure code execution on commodity computers:
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
[New York, NY]
ACM Books
[2014]
[San Rafael] M&C 2014 |
Ausgabe: | First edition |
Schriftenreihe: | ACM Books
2 |
Schlagworte: | |
Zusammenfassung: | As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted.In this book, I argue that we can resolve the tension between security and features by leverag |
Beschreibung: | xvii, 188 Seiten |
ISBN: | 9781627054775 9781627055451 9781627054782 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV046180152 | ||
003 | DE-604 | ||
005 | 20191028 | ||
007 | t | ||
008 | 191001s2014 m||| 00||| eng d | ||
020 | |a 9781627054775 |c Pb.: USD 59.95 |9 978-1-62705-477-5 | ||
020 | |a 9781627055451 |c Hb.: USD 89.95 |9 978-1-62705-545-1 | ||
020 | |a 9781627054782 |9 978-1-62705-478-2 | ||
035 | |a (OCoLC)1126552872 | ||
035 | |a (DE-599)BVBBV046180152 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
050 | 0 | |a T14.5 | |
082 | 0 | |a 005.8 | |
082 | 0 | |a 303.483 | |
100 | 1 | |a Parno, Bryan Jeffrey |e Verfasser |0 (DE-588)1197141855 |4 aut | |
245 | 1 | 0 | |a Trust extension as a mechanism for secure code execution on commodity computers |c Bryan Jeffrey Parno (Microsoft Research) |
250 | |a First edition | ||
264 | 1 | |a [New York, NY] |b ACM Books |c [2014] | |
264 | 1 | |a [San Rafael] |b M&C |c 2014 | |
300 | |a xvii, 188 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a ACM Books |v 2 | |
520 | 3 | |a As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted.In this book, I argue that we can resolve the tension between security and features by leverag | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF |z 978-1-62705-478-2 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 978-1-62705-479-9 |
830 | 0 | |a ACM Books |v 2 |w (DE-604)BV043585657 |9 2 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-031559700 |
Datensatz im Suchindex
_version_ | 1804180545110802432 |
---|---|
any_adam_object | |
author | Parno, Bryan Jeffrey |
author_GND | (DE-588)1197141855 |
author_facet | Parno, Bryan Jeffrey |
author_role | aut |
author_sort | Parno, Bryan Jeffrey |
author_variant | b j p bj bjp |
building | Verbundindex |
bvnumber | BV046180152 |
callnumber-first | T - Technology |
callnumber-label | T14 |
callnumber-raw | T14.5 |
callnumber-search | T14.5 |
callnumber-sort | T 214.5 |
callnumber-subject | T - General Technology |
ctrlnum | (OCoLC)1126552872 (DE-599)BVBBV046180152 |
dewey-full | 005.8 303.483 |
dewey-hundreds | 000 - Computer science, information, general works 300 - Social sciences |
dewey-ones | 005 - Computer programming, programs, data, security 303 - Social processes |
dewey-raw | 005.8 303.483 |
dewey-search | 005.8 303.483 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works 300 - Social sciences |
discipline | Informatik Soziologie |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02363nam a2200493 cb4500</leader><controlfield tag="001">BV046180152</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20191028 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">191001s2014 m||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781627054775</subfield><subfield code="c">Pb.: USD 59.95</subfield><subfield code="9">978-1-62705-477-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781627055451</subfield><subfield code="c">Hb.: USD 89.95</subfield><subfield code="9">978-1-62705-545-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781627054782</subfield><subfield code="9">978-1-62705-478-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1126552872</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046180152</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">T14.5</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.483</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Parno, Bryan Jeffrey</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1197141855</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trust extension as a mechanism for secure code execution on commodity computers</subfield><subfield code="c">Bryan Jeffrey Parno (Microsoft Research)</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[New York, NY]</subfield><subfield code="b">ACM Books</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[San Rafael]</subfield><subfield code="b">M&C</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 188 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">ACM Books</subfield><subfield code="v">2</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted.In this book, I argue that we can resolve the tension between security and features by leverag</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">978-1-62705-478-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-1-62705-479-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">ACM Books</subfield><subfield code="v">2</subfield><subfield code="w">(DE-604)BV043585657</subfield><subfield code="9">2</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031559700</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV046180152 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:37:28Z |
institution | BVB |
isbn | 9781627054775 9781627055451 9781627054782 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031559700 |
oclc_num | 1126552872 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | xvii, 188 Seiten |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | ACM Books M&C |
record_format | marc |
series | ACM Books |
series2 | ACM Books |
spelling | Parno, Bryan Jeffrey Verfasser (DE-588)1197141855 aut Trust extension as a mechanism for secure code execution on commodity computers Bryan Jeffrey Parno (Microsoft Research) First edition [New York, NY] ACM Books [2014] [San Rafael] M&C 2014 xvii, 188 Seiten txt rdacontent n rdamedia nc rdacarrier ACM Books 2 As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted.In this book, I argue that we can resolve the tension between security and features by leverag Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Rechnernetz (DE-588)4070085-9 s DE-604 Erscheint auch als Online-Ausgabe, PDF 978-1-62705-478-2 Erscheint auch als Online-Ausgabe, EPUB 978-1-62705-479-9 ACM Books 2 (DE-604)BV043585657 2 |
spellingShingle | Parno, Bryan Jeffrey Trust extension as a mechanism for secure code execution on commodity computers ACM Books Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4113937-9 |
title | Trust extension as a mechanism for secure code execution on commodity computers |
title_auth | Trust extension as a mechanism for secure code execution on commodity computers |
title_exact_search | Trust extension as a mechanism for secure code execution on commodity computers |
title_full | Trust extension as a mechanism for secure code execution on commodity computers Bryan Jeffrey Parno (Microsoft Research) |
title_fullStr | Trust extension as a mechanism for secure code execution on commodity computers Bryan Jeffrey Parno (Microsoft Research) |
title_full_unstemmed | Trust extension as a mechanism for secure code execution on commodity computers Bryan Jeffrey Parno (Microsoft Research) |
title_short | Trust extension as a mechanism for secure code execution on commodity computers |
title_sort | trust extension as a mechanism for secure code execution on commodity computers |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Datensicherung Rechnernetz Computersicherheit Hochschulschrift |
volume_link | (DE-604)BV043585657 |
work_keys_str_mv | AT parnobryanjeffrey trustextensionasamechanismforsecurecodeexecutiononcommoditycomputers |