Bootstrapping Trust in Modern Computers

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving securit...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Parno, Bryan (Συγγραφέας), McCune, Jonathan M. (Συγγραφέας), Perrig, Adrian (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: New York, NY : Springer New York, 2011.
Σειρά:SpringerBriefs in Computer Science, 10
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 02819nam a22004935i 4500
001 978-1-4614-1460-5
003 DE-He213
005 20151204191716.0
007 cr nn 008mamaa
008 110825s2011 xxu| s |||| 0|eng d
020 |a 9781461414605  |9 978-1-4614-1460-5 
024 7 |a 10.1007/978-1-4614-1460-5  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
100 1 |a Parno, Bryan.  |e author. 
245 1 0 |a Bootstrapping Trust in Modern Computers  |h [electronic resource] /  |c by Bryan Parno, Jonathan M. McCune, Adrian Perrig. 
264 1 |a New York, NY :  |b Springer New York,  |c 2011. 
300 |a IX, 101 p. 10 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Computer Science,  |x 2191-5768 ;  |v 10 
520 |a Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Database management. 
650 0 |a Information storage and retrieval. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Information Storage and Retrieval. 
650 2 4 |a Database Management. 
700 1 |a McCune, Jonathan M.  |e author. 
700 1 |a Perrig, Adrian.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781461414599 
830 0 |a SpringerBriefs in Computer Science,  |x 2191-5768 ;  |v 10 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4614-1460-5  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)