Trusted Computing Platforms: TCPA Technology in Context (可信計算平台:TCPA技術的背景分析)
Pearson Education
- 出版商: Prentice Hall
- 出版日期: 2002-08-01
- 定價: $1,650
- 售價: 6.0 折 $990
- 語言: 英文
- 頁數: 322
- 裝訂: Paperback
- ISBN: 0130092207
- ISBN-13: 9780130092205
-
相關分類:
資訊安全、資訊科學、Information-management
立即出貨(限量) (庫存=4)
買這商品的人也買了...
-
$1,029Fundamentals of Data Structures in C++
-
$680$537 -
$980$774 -
$1,150$1,127 -
$800$632 -
$1,294Web Services: A Technical Introduction
-
$780$741 -
$1,127Computer Networks, 4/e
-
$1,100$1,078 -
$760$600 -
$590$466 -
$350$315 -
$560$476 -
$680$666 -
$850$723 -
$1,127Operating System Concepts with Java, 6/e (IE) (美國版ISBN:0471489050)
-
$480$379 -
$750$593 -
$780$616 -
$450$360 -
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$720$569 -
$540$427 -
$1,650$1,568 -
$650$553
相關主題
商品描述
This book complements the TCPA standards by providing a plain-language explanation of the technical specifications, setting them in context and explaining how the technology can be used both in the short and longer term.
Table of Contents
Preface.
Acknowledgments.
Disclaimer.
About the Authors.
I. INTRODUCING TRUSTED PLATFORM TECHNOLOGY.
1. Trusted (Computing) Platforms: An Overview.
2. Usage Scenarios.
3.
Key Components of Trusted Platform Technology.
II. TRUST MECHANISMS IN A TRUSTED PLATFORM.
4. Access Control-Ownership, Enabling, and Authorization.
5. Platform
Identification and Certification.
6. Integrity Recording, Reporting, and
Secure Boot.
7. Protected Storage.
8. Migration and Maintenance
Mechanisms.
9. Conventional Security Functions and Assorted Host
Functions.
III. TRUSTED PLATFORMS IN PRACTICE.
10. Bringing a Trusted Platform to Life.
11. Building Trust.
12.
Challenging a Trusted Platform.
IV. TRUSTED PLATFORMS FOR ORGANIZATIONS AND INDIVIDUALS.
13. Corporate Deployment of Trusted Platforms.
14. The Trusted
Platform in Front of You.
Appendix A: Brief History of TCPA.
Appendix B:
Trust Models and the E-Commerce Domain.
Appendix C: Basic Cryptographic
Primitives Used in the TCPA Specification.
Glossary.
References.
Index.
商品描述(中文翻譯)
本書補充了TCPA標準,以簡明的語言解釋了技術規範,將其置於背景中並解釋了技術在短期和長期內的使用方式。
目錄
前言
致謝
免責聲明
關於作者
第一部分:介紹可信平台技術
1. 可信(計算)平台概述
2. 使用場景
3. 可信平台技術的關鍵組件
第二部分:可信平台中的信任機制
4. 存取控制-所有權、啟用和授權
5. 平台識別和認證
6. 完整性記錄、報告和安全啟動
7. 受保護的存儲
8. 遷移和維護機制
9. 傳統安全功能和各種主機功能
第三部分:實踐中的可信平台
10. 將可信平台實現
11. 建立信任
12. 挑戰可信平台
第四部分:組織和個人的可信平台
13. 企業部署可信平台
14. 面對您的可信平台
附錄A:TCPA的簡要歷史
附錄B:信任模型和電子商務領域
附錄C:TCPA規範中使用的基本加密原語
詞彙表
參考文獻
索引