Trusted Computing
This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative. This has resulted in the development of the notion of a "trusted platform", the main feature of which is the possession of a trusted hardware element capable of checking all or part of the software running on this platform. This new book introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. The book includes application examples which are based on recent and ongoing research.
1007695661
Trusted Computing
This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative. This has resulted in the development of the notion of a "trusted platform", the main feature of which is the possession of a trusted hardware element capable of checking all or part of the software running on this platform. This new book introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. The book includes application examples which are based on recent and ongoing research.
100.0 In Stock
Trusted Computing

Trusted Computing

by Chris Mitchell
Trusted Computing
Trusted Computing

Trusted Computing

by Chris Mitchell

eBook

$100.00 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative. This has resulted in the development of the notion of a "trusted platform", the main feature of which is the possession of a trusted hardware element capable of checking all or part of the software running on this platform. This new book introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. The book includes application examples which are based on recent and ongoing research.

Product Details

ISBN-13: 9781849190473
Publisher: The Institution of Engineering and Technology
Publication date: 01/10/2005
Series: Computing
Sold by: Barnes & Noble
Format: eBook
File size: 3 MB

About the Author

Chris Mitchell is Professor of Computer Science at Royal Holloway. He helped establish the Information Security Group and the M.Sc in Information Security. He has been involved with a number of international projects, including the Mobile VCE Core 3 programme, the Mobile VCE Core 2 programme, four recent EU 5th Framework projects, and two EU ACTS projects on security for third generation mobile telecommunications systems. He is currently convenor of Technical Panel 2 of BSI IST/33 and is involved with ISO/IEC JTC1/SC27. Professor Mitchell has edited eight international security standards, authored six books, and published well over 150 research papers. He is academic editor of Computer and Communications Security Abstracts, and a member of the Editorial Advisory Board for the journals of the London Mathematical Society. He is a member of Microsoft's Trustworthy Computing Academic Advisory Board, and he continues to act as a consultant on a variety of topics in information security.

Table of Contents

  • Chapter 1: What is trusted computing?
  • Chapter 2: Concepts of trusted computing
  • Chapter 3: An overview of trusted computing technology
  • Chapter 4: An overview of NGSCB
  • Chapter 5: The DAA scheme in context
  • Chapter 6: Single Sign-On using TCG-conformant platforms
  • Chapter 7: Secure delivery of conditional access applications to mobile receivers
  • Chapter 8: Enhancing user privacy using trusted computing
  • Chapter 9: Certificate management using distributed trusted third parties
  • Chapter 10: Securing peer-to-peer networks using trusted computing
  • Chapter 11: The future of trusted computing: an outlook
From the B&N Reads Blog

Customer Reviews