Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/trusted-computing-platforms-tcpa-technology-in-context/pearson/descriptif_1083696
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=1083696

Trusted computing platforms : TCPA technology in context

Langue : Anglais

Auteurs :

Couverture de l’ouvrage Trusted computing platforms : TCPA technology in context

An accessible introduction to a new industry standard that is a breakthrough in the field of computer security.

  • Authoratitive information from founding members of the Trusted Computing Platform Alliance (TCPA) technical committee.
  • TCPA founding members include HP, Microsoft, IBM, and Intel.
  • Trusted Platforms explained, implications explored, and examples illustrated using a variety of scenarios relevant to everyday business usage, including applications to mobile devices.
Trusted computing platforms are normal, open computer platforms (PC, server, printer, pda, mobile phone, etc) that have been modified to maintain privacy. This book explains Trusted Platform technology, a breakthrough in the field of computer security. It also provides an accessible introduction to a new industry standard in this space, recently introduced by the Trusted Computing Platform Alliance (TCPA), comprising the founding members HP, IBM, Microsoft, Compaq and Intel, as well as an extensive membership including Motorola, Cisco, Dell and AMD. This book explains the concept of the Trusted Platform, explores its implications, and illustrates the potential of the new technology using a variety of scenarios relevant to everyday business usage. Even established security professionals will not be familiar with these radical new concepts. Split into four parts, the first gives an overview of Trusted Platform technology, the second explains the TCPA specification, the third shows how Trusted Platforms can be built and used, and the fourth explores how this technology can be extended in the worlds of personal and business computing.

Siani Pearson, Boris Balacheff, Liqun Chen, David Plaquin, and Graeme Proudler work in Hewlett Packard Labs Trusted Computing Platforms Group, which took part in the founding of the Trusted Computing Platform Alliance (TCPA). The HP group contributed some of the original ideas on which TCPA technology is based, have been members of the TCPA technical committee since its inception and have helped develop the TCPA specifications, in collaboration with engineers from across the industry. The authors have a background in information security and work in the HP Labs Trusted E-Services laboratory in Bristol, England.

(NOTE: Each chapter concludes with Summary.)
Preface.
Acknowledgments.
Disclaimer.
About the Authors.

I. INTRODUCING TRUSTED PLATFORM TECHNOLOGY.

1. Trusted (Computing) Platforms: An Overview.
Summary of Trusted Platform Concepts. Why Are Trusted Platforms Trusted? The Value of Trusted Platforms. The Main Features of Trusted Platforms. When All Platforms Are Trusted Platforms.

2. Usage Scenarios.
Straightforward Application of TCPA Trusted Platforms. Speculative Use of Trusted Platforms.

3. Key Components of Trusted Platform Technology.
Special Properties of Trusted Platforms. Roots of Trust. Trusted Platform Architectural Adaptations. Integrity. Identity. Protected Storage. Secure Boot and Authenticated Boot Processes.

II. TRUST MECHANISMS IN A TRUSTED PLATFORM.


4. Access Control-Ownership, Enabling, and Authorization.
Enabling, Activating, and Owning a TPM. Cryptographic Authorization. Descriptions of TPM Capabilities.

5. Platform Identification and Certification.
Platform Endorsement. Attestation for Platform Identity Mechanisms. Generating a Trusted Platform Module Identity. Signing with TPM Identities. TPM Capabilities.

6. Integrity Recording, Reporting, and Secure Boot.
Platform Configuration Register (PCR). Data Integrity Registers. TPM Capabilities.

7. Protected Storage.
Concept of Protected Storage. Functions of Protected Storage.

8. Migration and Maintenance Mechanisms.
The Concepts of Migration and Maintenance. Migration. Maintenance. TPM Capabilities.

9. Conventional Security Functions and Assorted Host Functions.
Conventional Security Services. Capabilities. Auditing the TPM.

III. TRUSTED PLATFORMS IN PRACTICE.


10. Bringing a Trusted Platform to Life.
Building the Bases. Setting Up the Platform. Managing Authorization in the Key Hierarchy. On-Going Platform Support.

11. Building Trust.
In TCPA We Trust. Trusting the Roots. Trusting the Platform.

12. Challenging a Trusted Platform.
Communication with a Trusted Platform. Example.

IV. TRUSTED PLATFORMS FOR ORGANIZATIONS AND INDIVIDUALS.


13. Corporate Deployment of Trusted Platforms.
Overall Architecture. Deployment.

14. The Trusted Platform in Front of You.
Establishing Users Trust in Their TPs. Trusted Signing. Multiple Smart Cards. Dedicated Trusted States.

Appendix A: Brief History of TCPA.
Evolution of TCPA. About TCPA. Choice of Platform. Further Information.

Appendix B: Trust Models and the E-Commerce Domain.
Social Models of Trust. Trust in E-Commerce. Benefits for a Company in Being Associated with Trust. Conclusions.

Appendix C: Basic Cryptographic Primitives Used in the TCPA Specification.
Basic Security Services. Basic Cryptographic Primitives.

Glossary.
References.
Index.

Date de parution :

Ouvrage de 322 p.

18x24 cm

Sous réserve de disponibilité chez l'éditeur.

Prix indicatif 47,28 €

Ajouter au panier

Ces ouvrages sont susceptibles de vous intéresser