Trusted Computing Platforms: TCPA Technology in ContextPrentice Hall Professional, 2003 - 322 Seiten The TCPA 1.0 specification finally makes it possible to build low-cost computing platforms on a rock-solid foundation of trust. In Trusted Computing Platforms, leaders of the TCPA initiative place it in context, offering essential guidance for every systems developer and decision-maker. They explain what trusted computing platforms are, how they work, what applications they enable, and how TCPA can be used to protect data, software environments, and user privacy alike. |
Inhalt
LVIII | 165 |
LXI | 166 |
LXII | 169 |
LXIII | 173 |
LXIV | 175 |
LXV | 178 |
LXVI | 179 |
LXVII | 180 |
| 13 | |
| 15 | |
| 17 | |
| 21 | |
| 29 | |
| 39 | |
| 41 | |
| 43 | |
| 45 | |
| 53 | |
| 56 | |
| 57 | |
| 58 | |
| 59 | |
| 65 | |
| 74 | |
XXXI | 78 |
XXXII | 85 |
XXXIII | 90 |
XXXIV | 91 |
XXXV | 93 |
XXXVI | 95 |
XXXVII | 97 |
XXXVIII | 104 |
XXXIX | 106 |
XL | 112 |
XLI | 119 |
XLII | 121 |
XLIV | 124 |
XLV | 125 |
XLVI | 129 |
XLVII | 132 |
XLVIII | 136 |
XLIX | 137 |
L | 138 |
LI | 140 |
LII | 141 |
LIII | 143 |
LIV | 145 |
LV | 146 |
LVI | 158 |
LVII | 163 |
LXVIII | 193 |
LXIX | 195 |
LXX | 201 |
LXXI | 203 |
LXXII | 205 |
LXXIV | 212 |
LXXV | 219 |
LXXVI | 222 |
LXXVII | 224 |
LXXVIII | 225 |
LXXX | 226 |
LXXXI | 234 |
LXXXII | 238 |
LXXXIII | 239 |
LXXXV | 245 |
LXXXVI | 247 |
LXXXVII | 249 |
LXXXVIII | 251 |
XC | 261 |
XCI | 264 |
XCII | 265 |
XCIII | 266 |
XCIV | 271 |
XCV | 272 |
XCVI | 274 |
XCVII | 275 |
XCVIII | 277 |
C | 279 |
CI | 280 |
CIII | 281 |
CIV | 283 |
CV | 284 |
CVI | 285 |
CVII | 287 |
CVIII | 288 |
CIX | 289 |
CXI | 290 |
CXII | 297 |
CXIII | 305 |
CXIV | 309 |
Andere Ausgaben - Alle anzeigen
Häufige Begriffe und Wortgruppen
algorithm applications arbitrary data asymmetric key attestation authentication authorization data authorization secret authorization session boot process causes a TPM Certification Authority challenger Chapter command causes component computing platform configuration created credential CRTM cryptographic data object decryption described digest enable encryption entity example executed genuine TPM hardware hash hash function HMAC host platform identity certificate implementation inside the TPM integrity metrics ISO/IEC mechanisms nonce operation PCR values physical presence plat Privacy-CA protected key object Protected Storage protocol public endorsement key public key public key infrastructure remote requires rogue software root of trust server signing key smart card storage key stored Subsystem TCPA specification third party tion TPM capabilities TPM identity TPM identity key TPM key object TPM object TPM owner TPM owner authorization TPM protected key TPM protected object TPM's Trusted Platform Module trustworthy verify vouches
Beliebte Passagen
Seite 9 - Across disciplines, the common definition of trust is "a psychological state comprising the intention to accept vulnerability based upon positive expectations of the intentions or behavior of another" (Rousseau, Sitkin, Burt, & Camerer, 1998, p.
Seite 290 - Authentication is a service that is concerned with assuring that the origin of a message is correctly identified. That is, information delivered over a channel should be authenticated as to the origin, date of origin, data content, time sent, etc. For these reasons this service is subdivided into two major classes: entity authentication and data origin authentication. Notice that the second class of authentication implicitly provides data integrity. • Non-repudiation is a service that...
Seite 31 - CAs enables the owner to control traceability from an attestation's identity to the certificates that attest to a specific TPM and a specific platform. Identities can only be correlated with other identities by the CA that certifies these identities, and the owner has sole choice of that CA. So the owner can choose a CA whose policy is not to correlate identities or whose policy is to correlate identities, according to the wishes of the owner. Different identities are used for different purposes,...
Seite 290 - In all these cases, the quantities generated must be of sufficient size and be random in the sense that the probability of any particular value being selected must be sufficiently small to preclude an adversary from gaining advantage through optimizing a search strategy based on such probability.
Seite 41 - An entity can be trusted if it always behaves in the expected manner for the intended purpose.
Seite 30 - Protection against theft and misuse of secrets held on the platform. Such secrets are rendered unintelligible unless the correct access information is presented and the correct programs are running.
Seite 9 - . . . a firm belief in the reliability or truth or strength etc. of a person or thing ... a confident expectation . . . reliance on the truth of a statement etc.
Seite 37 - ... by the owner of the platform ). To obtain attestation from a CA. the platform's owner sends the CA information that proves thai the identity was created by a genuine Trusted Platform.
Verweise auf dieses Buch
ISSE 2004 — Securing Electronic Business Processes: Highlights Of The ... Sachar Paulus Eingeschränkte Leseprobe - 2004 |
ISSE 2004 — Securing Electronic Business Processes: Highlights of the ... Sachar Paulus Keine Leseprobe verfügbar - 2004 |

