Bootstrapping Trust in Modern Computers

Bootstrapping Trust in Modern Computers
Author :
Publisher : Springer Science & Business Media
Total Pages : 113
Release :
ISBN-10 : 9781461414605
ISBN-13 : 1461414601
Rating : 4/5 (05 Downloads)

Book Synopsis Bootstrapping Trust in Modern Computers by : Bryan Parno

Download or read book Bootstrapping Trust in Modern Computers written by Bryan Parno and published by Springer Science & Business Media. This book was released on 2011-08-27 with total page 113 pages. Available in PDF, EPUB and Kindle. Book excerpt: Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.


Bootstrapping Trust in Modern Computers Related Books

Bootstrapping Trust in Modern Computers
Language: en
Pages: 113
Authors: Bryan Parno
Categories: Computers
Type: BOOK - Published: 2011-08-27 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
Language: en
Pages: 177
Authors: Bryan Jeffrey Parno
Categories: Computers
Type: BOOK - Published: 2014-06-01 - Publisher: Morgan & Claypool Publishers

DOWNLOAD EBOOK

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamental
Computer Security – ESORICS 2017
Language: en
Pages: 573
Authors: Simon N. Foley
Categories: Computers
Type: BOOK - Published: 2017-09-01 - Publisher: Springer

DOWNLOAD EBOOK

The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017
Applied Cryptography and Network Security
Language: en
Pages: 667
Authors: Mark Manulis
Categories: Computers
Type: BOOK - Published: 2016-06-09 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford,
Security Protocols XXIII
Language: en
Pages: 377
Authors: Bruce Christianson
Categories: Computers
Type: BOOK - Published: 2015-11-24 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in Marc