Poetry Madness
 
 

Recently Viewed clear list


Interviews | March 17, 2014

Shawn Donley: IMG Peter Stark: The Powells.com Interview



Peter StarkIt's hard to believe that 200 years ago, the Pacific Northwest was one of the most remote and isolated regions in the world. In 1810, four years... Continue »
  1. $19.59 Sale Hardcover add to wish list

spacer
Qualifying orders ship free.
$194.25
New Hardcover
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Personal Computers- General

Trusted Computing Platforms: Design and Applications

by

Trusted Computing Platforms: Design and Applications Cover

 

Synopses & Reviews

Publisher Comments:

How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial efforts have advanced the notion of a "trusted computing platform" as a building block. Through a conspiracy of hardware and software magic, these platforms attempt to solve this remote trust problem, to preserve various critical properties against various types of adversaries. However, these current efforts are just points on a larger continuum, which ranges from earlier work on secure coprocessor design and applications, through TCPA/TCG, to recent academic developments. Without wading through stacks of theses and research literature, the general computer science reader cannot see this big picture. Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system security---and reports real case study experience with security architecture and applications on multiple types of platforms. The author examines the theory, design, implementation of the IBM 4758 secure coprocessor platform and discusses real case study applications that exploit the unique capabilities of this platform. The author discusses how these foundations grow into newer industrial designs, and discusses alternate architectures and case studies of applications that this newer hardware can enable. The author closes with an examination of more recent cutting-edge experimental work in this area. Trusted Computing Platforms:Design and Applications is written for security architects, application designers, and the general computer scientist interested in the evolution and uses of this emerging technology.

Synopsis:

From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system security Including real case study experience with security architecture and applications on multiple types of platforms. Examines the theory, design, implementation of the IBM 4758 secure coprocessor platform and discusses real case study applications that exploit the unique capabilities of this platform. Examines more recent cutting-edge experimental work in this area. Written for security architects, application designers, and the general computer scientist interested in the evolution and use of this emerging technology.

About the Author

Sean Smith is currently on the faculty of the Department of Computer Science at Dartmouth College, serves as director of the Cyber Security and Trust Research Center at Dartmouth's Institute for Security Technology Studies, and also serves as Principal Investigator of the Dartmouth PKI Lab.  His current research and teaching focus on how to build trustworthy systems in the real world.  He previously worked as a scientist at IBM T.J. Watson Research Center, doing secure coprocessor design, implementation and validation; and at Los Alamos National Laboratory, doing security designs and analyses for a wide range of public-sector clients.  Dr. Smith was educated at Princeton (B.A., Math) and Carnegie Mellon (M.S., Ph.D., Computer Science).

Table of Contents

Introduction.- Motivating Scenarios.- Attacks.- Foundations.- Design Challenges.- Platform Architecture.- Outbound Authentication.- Validation.- Application Case Studies.- TCPA/TCG.- Experimenting with TCPA/TCG.- New Horizons.

Product Details

ISBN:
9780387239163
Author:
Smith, Sean W.
Publisher:
Springer
Subject:
Computer Science
Subject:
Engineering - Electrical & Electronic
Subject:
Networking - General
Subject:
Electronic data processing
Subject:
Computer security
Subject:
Electricity
Subject:
Computer Communication Networks
Subject:
Communications Engineering, Networks
Subject:
Data Structures, Cryptology and Information Theory
Subject:
Data encryption.
Subject:
Personal Computers-General
Edition Number:
1
Edition Description:
Book
Series Volume:
Design and Applicati
Publication Date:
20041231
Binding:
HARDCOVER
Language:
English
Illustrations:
Y
Pages:
260
Dimensions:
235 x 155 mm 1200 gr

Other books you might like

  1. Trusted Computing Platforms: Tcpa... New Hardcover $44.95
  2. Computer Security Lab Manual (06... New Trade Paper $75.20
  3. What the Dormouse Said: How the... Used Hardcover $15.95
  4. Vanishing Women: Magic, Film, and... New Trade Paper $28.95
  5. Rules for Radicals Used Mass Market $4.50

Related Subjects

Computers and Internet » Computers Reference » General
Computers and Internet » Networking » General
Computers and Internet » Networking » Security » Cryptography
Computers and Internet » Personal Computers » General
Science and Mathematics » Electricity » General Electricity
Science and Mathematics » Mathematics » General
Transportation » Aviation » General

Trusted Computing Platforms: Design and Applications New Hardcover
0 stars - 0 reviews
$194.25 In Stock
Product details 260 pages Not Avail - English 9780387239163 Reviews:
"Synopsis" by , From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system security Including real case study experience with security architecture and applications on multiple types of platforms. Examines the theory, design, implementation of the IBM 4758 secure coprocessor platform and discusses real case study applications that exploit the unique capabilities of this platform. Examines more recent cutting-edge experimental work in this area. Written for security architects, application designers, and the general computer scientist interested in the evolution and use of this emerging technology.
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.