附註:Includes bibliographical references (pages 221-233) and index.
Preliminaries; Contents; List of Figures; List of Tables; Preface; Acknowledgments; 1. INTRODUCTION; 2. MOTIVATING SCENARIOS; 3. ATTACKS; 4. FOUNDATIONS; 5. DESIGN CHALLENGES; 6. PLATFORM ARCHITECTURE; 7. OUTBOUND AUTHENTICATION; 8. VALIDATION; 9. APPLICATION CASE STUDIES; 10. TCPA/TCG; 11. EXPERIMENTING WITH TCPA/TCG; 12. NEW HORIZONS; Glossary; References; About the Author; Index.
摘要:Trusted Computing Platforms: Design and Applications fills this gap. Starting with early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system security - and reports real case study experience with security architecture and applications on multiple types of platforms. The author examines the theory, design, and implementation of the IBM 4758 secure coprocessor platform and discusses real case study applications that exploit the unique capabilities of this platform. The author discusses how these foundatio.