Trusted Computing Platforms: TCPA Technology in Context (可信計算平台:TCPA技術的背景分析)

Pearson Education

買這商品的人也買了...

相關主題

商品描述

This book complements the TCPA standards by providing a plain-language explanation of the technical specifications, setting them in context and explaining how the technology can be used both in the short and longer term.

Table of Contents

Preface.
Acknowledgments.
Disclaimer.
About the Authors.

I. INTRODUCING TRUSTED PLATFORM TECHNOLOGY.

1. Trusted (Computing) Platforms: An Overview.
2. Usage Scenarios.
3. Key Components of Trusted Platform Technology.

 

II. TRUST MECHANISMS IN A TRUSTED PLATFORM.


4. Access Control-Ownership, Enabling, and Authorization.
5. Platform Identification and Certification.
6. Integrity Recording, Reporting, and Secure Boot.
7. Protected Storage.
8. Migration and Maintenance Mechanisms.
9. Conventional Security Functions and Assorted Host Functions. 

III. TRUSTED PLATFORMS IN PRACTICE.


10. Bringing a Trusted Platform to Life.
11. Building Trust.
12. Challenging a Trusted Platform.

IV. TRUSTED PLATFORMS FOR ORGANIZATIONS AND INDIVIDUALS.


13. Corporate Deployment of Trusted Platforms.
14. The Trusted Platform in Front of You.
Appendix A: Brief History of TCPA.
Appendix B: Trust Models and the E-Commerce Domain.
Appendix C: Basic Cryptographic Primitives Used in the TCPA Specification.
Glossary.
References.
Index.

商品描述(中文翻譯)

本書補充了TCPA標準,以簡明的語言解釋了技術規範,將其置於背景中並解釋了技術在短期和長期內的使用方式。

目錄
前言
致謝
免責聲明
關於作者

第一部分:介紹可信平台技術
1. 可信(計算)平台概述
2. 使用場景
3. 可信平台技術的關鍵組件

第二部分:可信平台中的信任機制
4. 存取控制-所有權、啟用和授權
5. 平台識別和認證
6. 完整性記錄、報告和安全啟動
7. 受保護的存儲
8. 遷移和維護機制
9. 傳統安全功能和各種主機功能

第三部分:實踐中的可信平台
10. 將可信平台實現
11. 建立信任
12. 挑戰可信平台

第四部分:組織和個人的可信平台
13. 企業部署可信平台
14. 面對您的可信平台
附錄A:TCPA的簡要歷史
附錄B:信任模型和電子商務領域
附錄C:TCPA規範中使用的基本加密原語
詞彙表
參考文獻
索引