Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a ‘trusted platform’, the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules.
This new text introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. It also includes application examples based on recent and ongoing research. The core of the book is based on an open workshop on Trusted Computing, held at Royal Holloway, University of London, UK.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a ‘trusted platform’, the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules.
This new text introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. It also includes application examples based on recent and ongoing research. The core of the book is based on an open workshop on Trusted Computing, held at Royal Holloway, University of London, UK.