Trusted computing :: principles and applications /
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin :
De Gruyter,
[2018]
|
Schriftenreihe: | Advances in computer science ;
volume 2. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers. |
Beschreibung: | 1 online resource (1 volume) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9783110477603 3110477602 9783110477597 3110477599 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1020288747 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 180124s2018 gw a ob 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d UMI |d CNCGM |d YDX |d N$T |d OCLCF |d OCLCQ |d LOA |d COCUF |d UKAHL |d QGK |d OCLCQ |d OCLCO |d K6U |d OCLCQ |d SFB |d OCLCO |d OCLCL | ||
020 | |a 9783110477603 |q (electronic bk.) | ||
020 | |a 3110477602 |q (electronic bk.) | ||
020 | |a 9783110477597 |q (electronic bk.) | ||
020 | |a 3110477599 |q (electronic bk.) | ||
020 | |z 9783110476040 | ||
020 | |z 3110476045 | ||
020 | |z 9783110476095 | ||
020 | |z 3110476096 | ||
035 | |a (OCoLC)1020288747 | ||
037 | |a CL0500000932 |b Safari Books Online | ||
050 | 4 | |a T58.64 | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Feng, Dengguo, |e author. |0 http://id.loc.gov/authorities/names/no2005116456 | |
245 | 1 | 0 | |a Trusted computing : |b principles and applications / |c Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao. |
264 | 1 | |a Berlin : |b De Gruyter, |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in computer science ; |v volume 2 | |
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed February 27, 2018) | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |t Frontmatter -- |t Preface -- |t Contents -- |t 1. Introduction -- |t 2. Trusted Platform Module -- |t 3. Building Chain of Trust -- |t 4. Trusted Software Stack -- |t 5. Trusted Computing Platform -- |t 6. Test and Evaluation of Trusted Computing -- |t 7. Remote Attestation -- |t 8. Trust Network Connection -- |t Appendix A: Foundations of Cryptography -- |t References -- |t Index |
520 | |a The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers. | ||
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Information technology |x Management. |0 http://id.loc.gov/authorities/subjects/sh2008006980 | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Technologie de l'information |x Gestion. | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Information technology |x Management |2 fast | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
700 | 1 | |a Qin, Yu, |e author. | |
700 | 1 | |a Chu, Xiaobo, |e author. | |
700 | 1 | |a Zhao, Shijun, |e author. | |
758 | |i has work: |a Trusted computing (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGTrccdrbRxfmJXhbqG9rC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
830 | 0 | |a Advances in computer science ; |v volume 2. |0 http://id.loc.gov/authorities/names/no2017049490 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1670218 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH31988471 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH35151799 | ||
938 | |a EBSCOhost |b EBSC |n 1670218 | ||
938 | |a YBP Library Services |b YANK |n 12862700 | ||
938 | |a YBP Library Services |b YANK |n 13158311 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1020288747 |
---|---|
_version_ | 1816882411437293569 |
adam_text | |
any_adam_object | |
author | Feng, Dengguo Qin, Yu Chu, Xiaobo Zhao, Shijun |
author_GND | http://id.loc.gov/authorities/names/no2005116456 |
author_facet | Feng, Dengguo Qin, Yu Chu, Xiaobo Zhao, Shijun |
author_role | aut aut aut aut |
author_sort | Feng, Dengguo |
author_variant | d f df y q yq x c xc s z sz |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | T58 |
callnumber-raw | T58.64 |
callnumber-search | T58.64 |
callnumber-sort | T 258.64 |
callnumber-subject | T - General Technology |
collection | ZDB-4-EBA |
contents | Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index |
ctrlnum | (OCoLC)1020288747 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03650cam a2200685 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1020288747</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">180124s2018 gw a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">UMI</subfield><subfield code="d">CNCGM</subfield><subfield code="d">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LOA</subfield><subfield code="d">COCUF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110477603</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3110477602</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110477597</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3110477599</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783110476040</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">3110476045</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783110476095</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">3110476096</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1020288747</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000932</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">T58.64</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Feng, Dengguo,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2005116456</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted computing :</subfield><subfield code="b">principles and applications /</subfield><subfield code="c">Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin :</subfield><subfield code="b">De Gruyter,</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in computer science ;</subfield><subfield code="v">volume 2</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed February 27, 2018)</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter --</subfield><subfield code="t">Preface --</subfield><subfield code="t">Contents --</subfield><subfield code="t">1. Introduction --</subfield><subfield code="t">2. Trusted Platform Module --</subfield><subfield code="t">3. Building Chain of Trust --</subfield><subfield code="t">4. Trusted Software Stack --</subfield><subfield code="t">5. Trusted Computing Platform --</subfield><subfield code="t">6. Test and Evaluation of Trusted Computing --</subfield><subfield code="t">7. Remote Attestation --</subfield><subfield code="t">8. Trust Network Connection --</subfield><subfield code="t">Appendix A: Foundations of Cryptography --</subfield><subfield code="t">References --</subfield><subfield code="t">Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2008006980</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qin, Yu,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chu, Xiaobo,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhao, Shijun,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Trusted computing (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGTrccdrbRxfmJXhbqG9rC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in computer science ;</subfield><subfield code="v">volume 2.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2017049490</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1670218</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH31988471</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH35151799</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1670218</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12862700</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">13158311</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1020288747 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:28:11Z |
institution | BVB |
isbn | 9783110477603 3110477602 9783110477597 3110477599 |
language | English |
oclc_num | 1020288747 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | De Gruyter, |
record_format | marc |
series | Advances in computer science ; |
series2 | Advances in computer science ; |
spelling | Feng, Dengguo, author. http://id.loc.gov/authorities/names/no2005116456 Trusted computing : principles and applications / Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao. Berlin : De Gruyter, [2018] ©2018 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Advances in computer science ; volume 2 Online resource; title from PDF title page (EBSCO, viewed February 27, 2018) Includes bibliographical references and index. Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers. Information technology Security measures. Information technology Management. http://id.loc.gov/authorities/subjects/sh2008006980 Technologie de l'information Sécurité Mesures. Technologie de l'information Gestion. COMPUTERS Information Technology. bisacsh COMPUTERS Security General. bisacsh Information technology Management fast Information technology Security measures fast Qin, Yu, author. Chu, Xiaobo, author. Zhao, Shijun, author. has work: Trusted computing (Text) https://id.oclc.org/worldcat/entity/E39PCGTrccdrbRxfmJXhbqG9rC https://id.oclc.org/worldcat/ontology/hasWork Advances in computer science ; volume 2. http://id.loc.gov/authorities/names/no2017049490 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1670218 Volltext |
spellingShingle | Feng, Dengguo Qin, Yu Chu, Xiaobo Zhao, Shijun Trusted computing : principles and applications / Advances in computer science ; Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index Information technology Security measures. Information technology Management. http://id.loc.gov/authorities/subjects/sh2008006980 Technologie de l'information Sécurité Mesures. Technologie de l'information Gestion. COMPUTERS Information Technology. bisacsh COMPUTERS Security General. bisacsh Information technology Management fast Information technology Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2008006980 |
title | Trusted computing : principles and applications / |
title_alt | Frontmatter -- Preface -- Contents -- 1. Introduction -- 2. Trusted Platform Module -- 3. Building Chain of Trust -- 4. Trusted Software Stack -- 5. Trusted Computing Platform -- 6. Test and Evaluation of Trusted Computing -- 7. Remote Attestation -- 8. Trust Network Connection -- Appendix A: Foundations of Cryptography -- References -- Index |
title_auth | Trusted computing : principles and applications / |
title_exact_search | Trusted computing : principles and applications / |
title_full | Trusted computing : principles and applications / Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao. |
title_fullStr | Trusted computing : principles and applications / Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao. |
title_full_unstemmed | Trusted computing : principles and applications / Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao. |
title_short | Trusted computing : |
title_sort | trusted computing principles and applications |
title_sub | principles and applications / |
topic | Information technology Security measures. Information technology Management. http://id.loc.gov/authorities/subjects/sh2008006980 Technologie de l'information Sécurité Mesures. Technologie de l'information Gestion. COMPUTERS Information Technology. bisacsh COMPUTERS Security General. bisacsh Information technology Management fast Information technology Security measures fast |
topic_facet | Information technology Security measures. Information technology Management. Technologie de l'information Sécurité Mesures. Technologie de l'information Gestion. COMPUTERS Information Technology. COMPUTERS Security General. Information technology Management Information technology Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1670218 |
work_keys_str_mv | AT fengdengguo trustedcomputingprinciplesandapplications AT qinyu trustedcomputingprinciplesandapplications AT chuxiaobo trustedcomputingprinciplesandapplications AT zhaoshijun trustedcomputingprinciplesandapplications |