Trusted Computing Platforms: Design and Applications
How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial efforts have advanced the notion of a "trusted computing platform" as a building block. Through a conspiracy of hardwar...
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Boston, MA :
Springer US,
2005.
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Motivating Scenarios
- Attacks
- Foundations
- Design Challenges
- Platform Architecture
- Outbound Authentication
- Validation
- Application Case Studies
- TCPA/TCG
- Experimenting with TCPA/TCG
- New Horizons.