The TCPA 1.0 specification finally makes it possible to build low-cost computing platforms on a rock-solid foundation of trust. In Trusted Computing Platforms, leaders of the TCPA initiative place it in context, offering essential guidance for every systems developer and decision-maker. They explain what trusted computing platforms are, how they work, what applications they enable, and how TCPA can be used to protect data, software environments, and user privacy alike.
The book summarizes key concepts and theories in trusted computing, e.g.
This book constitutes the refereed proceedings of the Second International Conference on Trusted Computing, TRUST 2009, held in Oxford, UK, in April 2009.
In Dynamics of a Trusted Platform David Grawrock has updated his highly popular Intel Safer Computing Initiative with new topics covering the latest developments in secure computing.
It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM.
... Fiammante, Jones, and Shah ISBN 0131870025 RATIONAL AND SOFTWARE DEVELOPMENT IBM Rational® ClearCase®, Ant, and CruiseControl Lee ISBN 0321356993 IBM® Rational® Unified Process® Reference and Certification Guide Shuja and Krebs ISBN ...
"This book is a must have resource guide for anyone who wants to ... implement TXT within their environments.
This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems.
Clear, practical tutorial style text with real-world applications First book on TPM for embedded designers Provides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards Covers all ...
This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy ...
This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008.