Normal view MARC view ISBD view

Bootstrapping Trust in Modern Computers [electronic resource] / by Bryan Parno, Jonathan M. McCune, Adrian Perrig.

By: Parno, Bryan [author.].
Contributor(s): McCune, Jonathan M [author.] | Perrig, Adrian [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: SpringerBriefs in Computer Science: 10Publisher: New York, NY : Springer New York, 2011Description: IX, 101p. 10 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781461414605.Subject(s): Computer science | Computer Communication Networks | Database management | Information storage and retrieval systems | Computer Science | Computer Communication Networks | Information Storage and Retrieval | Database ManagementDDC classification: 004.6 Online resources: Click here to access online In: Springer eBooksSummary: Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue