Bootstrapping Trust in Modern Computers Bootstrapping Trust in Modern Computers
SpringerBriefs in Computer Science

Bootstrapping Trust in Modern Computers

Bryan Parno and Others
    • £27.99
    • £27.99

Publisher Description

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.

GENRE
Computing & Internet
RELEASED
2011
27 August
LANGUAGE
EN
English
LENGTH
110
Pages
PUBLISHER
Springer New York
SIZE
993.8
KB
Information Security Information Security
2021
Collaborative Financial Infrastructure Protection Collaborative Financial Infrastructure Protection
2012
CCNSP-NP CCNSP-NP
2013
OS X Exploits and Defense (Enhanced Edition) OS X Exploits and Defense (Enhanced Edition)
2011
The Amazing Journey of Reason The Amazing Journey of Reason
2019
Agile Risk Management Agile Risk Management
2014
Introduction to Ethical Software Development Introduction to Ethical Software Development
2025
Machine Learning in Sports Machine Learning in Sports
2025
Objective Information Theory Objective Information Theory
2023
IoT Supply Chain Security Risk Analysis and Mitigation IoT Supply Chain Security Risk Analysis and Mitigation
2022