| 000 | 02810nam a22004935i 4500 | ||
|---|---|---|---|
| 001 | 978-1-4614-1460-5 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083733.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 110825s2011 xxu| s |||| 0|eng d | ||
| 020 |
_a9781461414605 _9978-1-4614-1460-5 |
||
| 024 | 7 |
_a10.1007/978-1-4614-1460-5 _2doi |
|
| 050 | 4 | _aTK5105.5-5105.9 | |
| 072 | 7 |
_aUKN _2bicssc |
|
| 072 | 7 |
_aCOM075000 _2bisacsh |
|
| 082 | 0 | 4 |
_a004.6 _223 |
| 100 | 1 |
_aParno, Bryan. _eauthor. |
|
| 245 | 1 | 0 |
_aBootstrapping Trust in Modern Computers _h[electronic resource] / _cby Bryan Parno, Jonathan M. McCune, Adrian Perrig. |
| 264 | 1 |
_aNew York, NY : _bSpringer New York, _c2011. |
|
| 300 |
_aIX, 101p. 10 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aSpringerBriefs in Computer Science, _x2191-5768 ; _v10 |
|
| 520 | _aTrusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aDatabase management. | |
| 650 | 0 | _aInformation storage and retrieval systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aInformation Storage and Retrieval. |
| 650 | 2 | 4 | _aDatabase Management. |
| 700 | 1 |
_aMcCune, Jonathan M. _eauthor. |
|
| 700 | 1 |
_aPerrig, Adrian. _eauthor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9781461414599 |
| 830 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5768 ; _v10 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4614-1460-5 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c106290 _d106290 |
||