Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Person/Organisation
Keywords
Access
  • 1
    Online Resource
    Online Resource
    Chichester, England ; : John Wiley & Sons,
    UID:
    almafu_9959328720102883
    Format: 1 online resource (xii, 243 pages) : , illustrations
    ISBN: 047087175X , 9780470871751 , 0470871741 , 9780470871744 , 0470871768 , 9780470871768
    Content: Annotation
    Note: Cover Table of Contents List of Figures List of Tables Preface Acknowledgments 1. INTRODUCTION 1.1 Trust and Computing 1.2 Instantiations 1.3 Design and Applications 1.4 Progression 2. MOTIVATING SCENARIOS 2.1 Properties 2.2 Basic Usage 2.3 Examples of Basic Usage 2.4 Position and Interests 2.5 Examples of Positioning 2.6 The Idealogical Debate 2.7 Further Reading 3. ATTACKS 3.1 Physical Attack 3.2 Software Attacks 3.3 Side-channel Analysis 3.4 Undocumented Functionality 3.5 Erasing Data 3.6 System Context 3.7 Defensive Strategy 3.8 Further Reading 4. FOUNDATIONS 4.1 Applications and Integration 4.2 Architectures 4.3 Booting 4.4 The Defense Community 4.5 Further Reading 5. DESIGN CHALLENGES 5.1 Context 5.2 Obstacles 5.3 Requirements 5.4 Technology Decisions 5.5 Further Reading 6. PLATFORM ARCHITECTURE 6.1 Overview 6.2 Erasing Secrets 6.3 The Source of Secrets 6.4 Software Threats 6.5 Code Integrity 6.6 Code Loading 6.7 Putting it All Together 6.8 What's Next 6.9 Further Reading 7. OUTBOUND AUTHENTICATION 7.1 Problem 7.2 Theory 7.3 Design and Implementation 7.4 Further Reading 8. VALIDATION 8.1 The Validation Process 8.2 Validation Strategy 8.3 Formalizing Security Properties 8.4 Formal Verification 8.5 Other Validation Tasks 8.6 Reflection 8.7 Further Reading 9. APPLICATION CASE STUDIES 9.1 Basic Building Blocks 9.2 Hardened Web Servers 9.3 Rights Management for Big Brother's Computer 9.4 Private Information 9.5 Other Projects 9.6 Lessons Learned 9.7 Further Reading 10. TCPA/TCG 10.1 Basic Structure 10.2 Outbound Authentication 10.3 Physical Attacks 10.4 Applications 10.5 Experimentation 10.6 TPM 1.2 Changes 10.7 Further Reading 11. EXPERIMENTING WITH TCPA/TCG 11.1 Desired Properties 11.2 The Lifetime Mismatch 11.3 Architecture 11.4 Implementation Experience 11.5 Application: Hardened Apache 11.6 Application: OpenCA 11.7 Application: Compartmented Attestation 11.8 Further Reading 12. NEW HORIZONS 12.1 Privilege Architectures 12.2 Hardware Research 12.3 Software Research 12.4 Current Industrial Platforms 12.5 Looming Industry Platforms 12.6 Secure Coprocessing Revisited 12.7 Further Reading Glossary References About the Author.
    Additional Edition: Print version: Chen, Zhi Ning. Broadband planar antennas. Chichester, England ; Hoboken, NJ : John Wiley & Sons, ©2006 ISBN 0470871741
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Chichester 〈〈[u.a.]〉〉 : Wiley
    UID:
    b3kat_BV024618390
    Format: 1 Online-Ressource
    ISBN: 9780470871744 , 9780470871768
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9780470717868?
Did you mean 9780470671788?
Did you mean 9780470371763?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages