Trusted Computing Platforms: TCPA Technology in Context

Cover
Prentice Hall Professional, 2003 - 322 Seiten
The TCPA 1.0 specification finally makes it possible to build low-cost computing platforms on a rock-solid foundation of trust. In Trusted Computing Platforms, leaders of the TCPA initiative place it in context, offering essential guidance for every systems developer and decision-maker. They explain what trusted computing platforms are, how they work, what applications they enable, and how TCPA can be used to protect data, software environments, and user privacy alike.
 

Inhalt

III
1
IV
3
V
4
VII
5
IX
7
X
9
XII
10
XIV
12
LVIII
165
LXI
166
LXII
169
LXIII
173
LXIV
175
LXV
178
LXVI
179
LXVII
180

XV
13
XVI
15
XVII
17
XVIII
21
XIX
29
XX
39
XXI
41
XXII
43
XXIII
45
XXIV
53
XXV
56
XXVI
57
XXVII
58
XXVIII
59
XXIX
65
XXX
74
XXXI
78
XXXII
85
XXXIII
90
XXXIV
91
XXXV
93
XXXVI
95
XXXVII
97
XXXVIII
104
XXXIX
106
XL
112
XLI
119
XLII
121
XLIV
124
XLV
125
XLVI
129
XLVII
132
XLVIII
136
XLIX
137
L
138
LI
140
LII
141
LIII
143
LIV
145
LV
146
LVI
158
LVII
163
LXVIII
193
LXIX
195
LXX
201
LXXI
203
LXXII
205
LXXIV
212
LXXV
219
LXXVI
222
LXXVII
224
LXXVIII
225
LXXX
226
LXXXI
234
LXXXII
238
LXXXIII
239
LXXXV
245
LXXXVI
247
LXXXVII
249
LXXXVIII
251
XC
261
XCI
264
XCII
265
XCIII
266
XCIV
271
XCV
272
XCVI
274
XCVII
275
XCVIII
277
C
279
CI
280
CIII
281
CIV
283
CV
284
CVI
285
CVII
287
CVIII
288
CIX
289
CXI
290
CXII
297
CXIII
305
CXIV
309
Urheberrecht

Andere Ausgaben - Alle anzeigen

Häufige Begriffe und Wortgruppen

Beliebte Passagen

Seite 9 - Across disciplines, the common definition of trust is "a psychological state comprising the intention to accept vulnerability based upon positive expectations of the intentions or behavior of another" (Rousseau, Sitkin, Burt, & Camerer, 1998, p.
Seite 290 - Authentication is a service that is concerned with assuring that the origin of a message is correctly identified. That is, information delivered over a channel should be authenticated as to the origin, date of origin, data content, time sent, etc. For these reasons this service is subdivided into two major classes: entity authentication and data origin authentication. Notice that the second class of authentication implicitly provides data integrity. • Non-repudiation is a service that...
Seite 31 - CAs enables the owner to control traceability from an attestation's identity to the certificates that attest to a specific TPM and a specific platform. Identities can only be correlated with other identities by the CA that certifies these identities, and the owner has sole choice of that CA. So the owner can choose a CA whose policy is not to correlate identities or whose policy is to correlate identities, according to the wishes of the owner. Different identities are used for different purposes,...
Seite 290 - In all these cases, the quantities generated must be of sufficient size and be random in the sense that the probability of any particular value being selected must be sufficiently small to preclude an adversary from gaining advantage through optimizing a search strategy based on such probability.
Seite 41 - An entity can be trusted if it always behaves in the expected manner for the intended purpose.
Seite 30 - Protection against theft and misuse of secrets held on the platform. Such secrets are rendered unintelligible unless the correct access information is presented and the correct programs are running.
Seite 9 - . . . a firm belief in the reliability or truth or strength etc. of a person or thing ... a confident expectation . . . reliance on the truth of a statement etc.
Seite 37 - ... by the owner of the platform ). To obtain attestation from a CA. the platform's owner sends the CA information that proves thai the identity was created by a genuine Trusted Platform.

Bibliografische Informationen