Master your Minecraft
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Tour our stores


    Recently Viewed clear list


    Best Books of the Year | December 7, 2014

    Gigi Little: IMG Best Kids' Books of 2014



    No, I'm sorry, it's impossible. The best kids' books of 2014? The best? Can't do it. There have been entirely too many exceptional examples of the... Continue »
    1. $11.87 Sale Board Book add to wish list

      Countablock

      Christopher Franceschelli and Peskimo 9781419713743

    spacer

On Order

$44.95
New Hardcover
Currently out of stock.
Add to Wishlist
available for shipping or prepaid pickup only
Qty Store Section
- Local Warehouse Networking- Computer Security

Trusted Computing Platforms: Tcpa Technology in Context

by

Trusted Computing Platforms: Tcpa Technology in Context Cover

 

Synopses & Reviews

Publisher Comments:

TCPA: Building computing platforms upon a solid foundation of trust.

As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms, leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future.

  • What trusted computing platforms are, how they work, and what problems they will solve
  • Transforming standard platforms into trusted platforms cost-effectively
  • Scenarios for managers: TCPA applications in the security-focused business
  • Protected storage: how TCPA can ensure the confidentiality of stored data
  • Software integrity: ensuring that a system's software environment hasn't been tampered with
  • Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead
  • Trusted platforms in practice: TCPA for developers and technical professionals
  • How trusted platforms can be used to protect user privacy
  • The TCPA initiative: its history, status, and next steps forward

Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology—and with this book, you will.

Synopsis:

The TCPA 1.0 specification finally makes it possible to build low-cost computing platforms on a rock-solid foundation of trust. In Trusted Computing Platforms, leaders of the TCPA initiative place it in context, offering essential guidance for every systems developer and decision-maker. They explain what trusted computing platforms are, how they work, what applications they enable, and how TCPA can be used to protect data, software environments, and user privacy alike.

About the Author

About the Editor

DR. SIANI PEARSON is a Research Scientist at Hewlett Packard's Trusted e-Services Lab and has been a key member of the HP Labs team involved in founding and developing the Trusted Computer Platform Alliance (TCPA). She holds a Ph.D. in automated theorem proving at Edinburgh University and earned a fellowship at Cambridge University working in the same field. For the past four years, her research has focused on computer security, trust, and privacy.

With contributions from:

  • Boris Balacheff
  • Liqun Chen
  • Dr. Siani Pearson
  • David Plaquin
  • Graeme Proudler

Table of Contents

(NOTE: Each chapter concludes with Summary.)

Preface.

Acknowledgments.

Disclaimer.

About the Authors.

I. INTRODUCING TRUSTED PLATFORM TECHNOLOGY.

1. Trusted (Computing) Platforms: An Overview.

Summary of Trusted Platform Concepts. Why Are Trusted Platforms 'Trusted'? The Value of Trusted Platforms. The Main Features of Trusted Platforms. When All Platforms Are Trusted Platforms.
2. Usage Scenarios.

Straightforward Application of TCPA Trusted Platforms. Speculative Use of Trusted Platforms.
3. Key Components of Trusted Platform Technology.

Special Properties of Trusted Platforms. Roots of Trust. Trusted Platform Architectural Adaptations. Integrity. Identity. Protected Storage. Secure Boot and Authenticated Boot Processes.

II. TRUST MECHANISMS IN A TRUSTED PLATFORM.

4. Access Control-Ownership, Enabling, and Authorization.

Enabling, Activating, and Owning a TPM. Cryptographic Authorization. Descriptions of TPM Capabilities.
5. Platform Identification and Certification.

Platform Endorsement. Attestation for Platform Identity Mechanisms. Generating a Trusted Platform Module Identity. Signing with TPM Identities. TPM Capabilities.
6. Integrity Recording, Reporting, and Secure Boot.

Platform Configuration Register (PCR). Data Integrity Registers. TPM Capabilities.
7. Protected Storage.

Concept of Protected Storage. Functions of Protected Storage.
8. Migration and Maintenance Mechanisms.

The Concepts of Migration and Maintenance. Migration. Maintenance. TPM Capabilities.
9. Conventional Security Functions and Assorted Host Functions.

Conventional Security Services. Capabilities. Auditing the TPM.

III. TRUSTED PLATFORMS IN PRACTICE.

10. Bringing a Trusted Platform to Life.

Building the Bases. Setting Up the Platform. Managing Authorization in the Key Hierarchy. On-Going Platform Support.
11. Building Trust.

In TCPA We Trust. Trusting the Roots. Trusting the Platform.
12. Challenging a Trusted Platform.

Communication with a Trusted Platform. Example.

IV. TRUSTED PLATFORMS FOR ORGANIZATIONS AND INDIVIDUALS.

13. Corporate Deployment of Trusted Platforms.

Overall Architecture. Deployment.
14. The Trusted Platform in Front of You.

Establishing Users' Trust in Their TPs. Trusted Signing. Multiple Smart Cards. Dedicated Trusted States.
Appendix A: Brief History of TCPA.

Evolution of TCPA. About TCPA. Choice of Platform. Further Information.
Appendix B: Trust Models and the E-Commerce Domain.

Social Models of Trust. Trust in E-Commerce. Benefits for a Company in Being Associated with Trust. Conclusions.
Appendix C: Basic Cryptographic Primitives Used in the TCPA Specification.

Basic Security Services. Basic Cryptographic Primitives.
Glossary.

References.

Index.

Product Details

ISBN:
9780130092205
Editor:
Pearson, Siani
Foreword:
Preneel, Bart
Editor:
Pearson, Siani
Author:
Balacheff, Boris
Author:
Chen, Liqun
Author:
Pearson, Siani
Author:
Proudler, Graeme
Publisher:
Prentice Hall PTR
Location:
Upper Saddle River, N.J.
Subject:
Networking - General
Subject:
Computer networks
Subject:
Computer security
Subject:
Security
Subject:
Electronic information resources.
Subject:
Security - General
Subject:
Internet - Security
Subject:
Computer networks -- Security measures.
Subject:
Computer security -- Standards.
Subject:
Networking-Computer Security
Copyright:
Edition Description:
Trade paper
Series:
HP Professional Series
Series Volume:
no 401
Publication Date:
July 2002
Binding:
Hardcover
Grade Level:
Professional and scholarly
Language:
English
Illustrations:
Yes
Pages:
352
Dimensions:
9.52x7.28x.82 in. 1.34 lbs.

Other books you might like

  1. Computer Security Lab Manual (06... New Trade Paper $79.80
  2. Privacy Protection and Computer... New Hardcover $94.25
  3. Trusted Computing Platforms: Design... New Hardcover $194.25

Related Subjects

Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General

Trusted Computing Platforms: Tcpa Technology in Context New Hardcover
0 stars - 0 reviews
$44.95 Backorder
Product details 352 pages Prentice Hall PTR - English 9780130092205 Reviews:
"Synopsis" by , The TCPA 1.0 specification finally makes it possible to build low-cost computing platforms on a rock-solid foundation of trust. In Trusted Computing Platforms, leaders of the TCPA initiative place it in context, offering essential guidance for every systems developer and decision-maker. They explain what trusted computing platforms are, how they work, what applications they enable, and how TCPA can be used to protect data, software environments, and user privacy alike.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.