Bootstrapping Trust in Modern Computers Bootstrapping Trust in Modern Computers
SpringerBriefs in Computer Science

Bootstrapping Trust in Modern Computers

Bryan Parno and Others
    • $44.99
    • $44.99

Publisher Description

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.

GENRE
Computing & Internet
RELEASED
2011
27 August
LANGUAGE
EN
English
LENGTH
110
Pages
PUBLISHER
Springer New York
SELLER
Springer Nature B.V.
SIZE
993.8
KB

More Books Like This

Trusted Computing Trusted Computing
2009
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
2014
Trusted Computing - Challenges and Applications Trusted Computing - Challenges and Applications
2008
Future of Trust in Computing Future of Trust in Computing
2009
Security and Privacy in Mobile Information and Communication Systems Security and Privacy in Mobile Information and Communication Systems
2009
Cybersecurity Cybersecurity
2022

Other Books in This Series

Encrypted Email Encrypted Email
2015
Fitting Splines to a Parametric Function Fitting Splines to a Parametric Function
2019
Edge Computing: A Primer Edge Computing: A Primer
2018
Autonomous Robotics and Deep Learning Autonomous Robotics and Deep Learning
2014
Agile Risk Management Agile Risk Management
2014
Open-Set Text Recognition Open-Set Text Recognition
2024