• Complain

Dengguo Feng - Trusted Computing: Principles and Applications

Here you can read online Dengguo Feng - Trusted Computing: Principles and Applications full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2017, publisher: De Gruyter, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Dengguo Feng Trusted Computing: Principles and Applications

Trusted Computing: Principles and Applications: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Trusted Computing: Principles and Applications" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Dengguo Feng: author's other books


Who wrote Trusted Computing: Principles and Applications? Find out the surname, the name of the author of the book and a list of all author's works by series.

Trusted Computing: Principles and Applications — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Trusted Computing: Principles and Applications" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents Guide Dengguo Feng Yu Qin Xiaobo Chu Shijun Zhao Trusted - photo 1
Contents
Guide
Trusted Computing Principles and Applications - image 2

Dengguo Feng, Yu Qin, Xiaobo Chu, Shijun Zhao

Trusted Computing

Advances in Computer Science

Trusted Computing Principles and Applications - image 3

Volume 2

This work is co-published by Tsinghua University Press and Walter de Gruyter - photo 4

This work is co-published by Tsinghua University Press and Walter de Gruyter GmbH.

Authors

Dengguo Feng

Yu Qin

Xiaobo Chu

Shijun Zhao

Institute of Software, Chinese Academy of Science.

ISBN 978-3-11-047604-0

e-ISBN (PDF) 978-3-11-047759-7

e-ISBN (EPUB) 978-3-11-047609-5

Set-ISBN 978-3-11-047760-3

ISSN 2509-7253

Library of Congress Cataloging-in-Publication Data

A CIP catalog record for this book has been applied for at the Library of Congress.

Bibliographic information published by the Deutsche Nationalbibliothek

The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available on the Internet at http://dnb.dnb.de.

2018 Walter de Gruyter GmbH, Berlin/Boston

www.degruyter.com

Preface

With further development of computer network, the three most prominent threats are gradually highlighted, including attacks from malicious code, illegal stealing of information and illegal corruption of data and system. Within these threats, attacks from malicious code have surpassed traditional computer virus to be the predominant threat to private information of computer users. These threats originate from the situation that computer architecture lacks an immune system against malicious code. Thus, it is a core issue to accommodate immune system in computer architecture and ensure a computer platform to run securely and trustworthily.

Trusted computing is a kind of technique proposed under this background. By establishing a mechanism of integrity measurement, trusted computing enables computing platforms to distinguish between trusted programs and untrusted programs. In this way, computing platforms employ reliable countermeasures to prevent untrusted programs from disrupting.

I led a team starting research in trusted computing technique as early as 2003. Since 2006, I have been the chairman of TCMU (Trusted Cryptography Module Union) of China. I actively promote research, development and industrialization of trusted computing in China, and have achieved satisfactory results. Our team has taken a number of national research projects, including projects from Chinese 863 Program, industrialization projects of high technique from National Development and Reform Committee and major programs from National Natural Science Foundation. We have made breakthrough in several key aspects of trusted computing, including establishing and repairing technique of chain of trust, remote attestation protocol based on TCM and automatic generation method of test use cases based on reduction. We have also proposed a series of products, including advanced security supporting platform of trusted computing with self-owned intellectual property and test and evaluation system of trusted computing that supports compliance test, security test and performance test of trusted computing. These products have obtained good social and economic benefits now. Our research result Research and Application on the Security Supporting Platform and Key Technique for Trusted Computing achieved the first prize of Information Science Technique awarded by Chinese Institute of Electronics in 2010. In the future, we will continue our work and strive for better achievements and greater honor.

This book includes eight chapters. proposes trusted network connection.

The main content of this book comes from my formal monograph Trusted Computing Theory and Practice (ISBN:9787302314226), which is written in Chinese and published by Tsinghua University Press in 2013. Weve made our effort to translate the monograph,make corrections on its contents which are outdated and add a few new technologies, so as to present the highest quality collection of trusted computing technology. A group of my colleagues and doctor candidates have participated in writing and proofreading this book, including Yu Qin, Xiaobo Chu, Shijun Zhao, Jing Xu, Dexian Chang, Jianxiong Shao, Weijin Wang, Bo Yang, Bianxia Du and Wei Feng. We have also got great help from many researchers and editors. We want to express my sincere thanks to them here.

Dengguo Feng

March 17, 2017.

1Introduction

With rapid development of cloud computing, Internet of Things and mobile Internet, information technology has changed society management and public life profoundly, and ubiquitous information has already been treated as important digital assets of a nation, an enterprise or a person. Considering widespread computer virus, malicious software and enhanced hacker technique, these important assets are facing more and more practical threats. It is no doubt a preferential security requirement from nation, enterprise and person that a trustworthy computing environment should be built to maintain confidentiality, integrity, authenticity and reliability of information. Traditional security technologies like firewall, IDS and virus defense usually focus on server-side computing platforms, thus relatively vulnerable client-side terminals are gradually becoming the weak link of an information system. Against these requirements and threats, trusted computing (TC) technology aims at establishing a trust transfer system by improving the security of computer architecture, so as to ensure the security of platform and solve the trust problem of man-to-program, man-to-computer and man-to-man.

Trusted computing is an emerging technology under this background. Up to now, there exist many different ways of understanding of trusted. Several authoritative organizations, such as ISO/IEC, IEEE and TCG (Trusted Computing Group), have made efforts to establish their own explicit definitions []. TCG has further proposed a novel and widely accepted solution for enhancing security of computer system by embedding TPM (Trusted Platform Module) into hardware platform. In this book, our point of view is similar to that of TCG. We argue that a trusted computer system should always act in an expected way, and this property could be achieved by a trusted computing environment established upon a dedicated security chip.

Early in the middle of 1990s, some computer manufacturers began to research security solutions based on trusted computing technology. By adding a security chip into computer hardware, these solutions implement a series of mechanisms, such as the root of trust, secure storage and chain of trust, and achieve the secure goal of trusted computing environment. This kind of technical schemes was widely accepted by the IT industry, and as a result TCPA (Trusted Computing Platform Alliance, a mainstream industry alliance of trusted computing technique) was founded in 1999. After TCPA proposed TPM1.1 specifications in 2001, trusted computing products proposed by some mainstream IT manufacturers were gradually accepted by market and industry society. In 2003, TCPA was renamed to TCG and owned about 200 members, including nearly all international mainstream IT manufacturers. Technical specifications proposed by TCG had already formed a systematic architecture, which involves major IT areas like security chip, PC, server and network, and four core specifications were accepted as ISO standards in 2009. By 2010, TPM had already been a standard component of laptop and desktop, and mainstream PC-related manufacturers such as Microsoft and Intel also had adopted trusted computing in their core products.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Trusted Computing: Principles and Applications»

Look at similar books to Trusted Computing: Principles and Applications. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Trusted Computing: Principles and Applications»

Discussion, reviews of the book Trusted Computing: Principles and Applications and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.