Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Online-Ressource
    Online-Ressource
    [New York, NY] : ACM Books | [San Rafael] : M&C
    ISBN: 9781627054782
    Sprache: Englisch
    Seiten: 1 Online-Ressource (xvii, 188 Seiten)
    Ausgabe: First edition
    Serie: ACM Books 2
    Paralleltitel: Erscheint auch als
    Paralleltitel: Erscheint auch als
    Paralleltitel: Erscheint auch als
    DDC: 303.483
    Schlagwort(e): Rechnernetz ; Datensicherung ; Computersicherheit ; Hochschulschrift ; Hochschulschrift ; Computersicherheit ; Datensicherung ; Rechnernetz
    Kurzfassung: As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted.In this book, I argue that we can resolve the tension between security and features by leverag
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Buch
    Buch
    [New York, NY] : ACM Books | [San Rafael] : M&C
    ISBN: 9781627054775 , 9781627055451 , 9781627054782
    Sprache: Englisch
    Seiten: xvii, 188 Seiten
    Ausgabe: First edition
    Serie: ACM Books 2
    Serie: ACM Books
    Paralleltitel: Erscheint auch als
    Paralleltitel: Erscheint auch als
    DDC: 005.8
    Schlagwort(e): Datensicherung ; Rechnernetz ; Computersicherheit ; Hochschulschrift ; Computersicherheit ; Datensicherung ; Rechnernetz
    Kurzfassung: As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted.In this book, I argue that we can resolve the tension between security and features by leverag
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Morgan & Claypool Publishers
    ISBN: 9781627054799
    Sprache: Englisch
    Seiten: 1 online resource (209 pages)
    Serie: ACM Bks.
    Paralleltitel: Erscheint auch als
    DDC: 303.4/83
    Schlagwort(e): Computers and civilization ; Information technology -- Social aspects ; Technology -- Social aspects ; Computers and civilization.. ; Information technology ; Social aspects.. ; Technology ; Social aspects ; Electronic books
    Kurzfassung: As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted.In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today.Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design,
    Kurzfassung: Intro -- Contents -- Preface -- Introduction -- Insecure Computers in a Hostile World -- A Vision for a Better World -- Overview: Building Up from a Firm Foundation -- Bootstrapping Trust in a Commodity Computer -- Securely Executing Code on a Commodity Computer -- Leveraging Secure Code Execution to Improve Network Protocols -- Secure Code Execution Despite Untrusted Software and Hardware -- Summary of Contributions -- Background and Related Work in Trust Establishment -- What Do We Need to Know? Techniques for Recording Platform State -- Can We Use Platform Information Locally? -- Can We Use Platform Information Remotely? -- How DoWe Make Sense of Platform State? -- Roots of Trust -- Validating the Process -- Applications -- Human Factors and Usability -- Limitations -- Additional Reading -- Summary -- Bootstrapping Trust in a Commodity Computer -- Problem Definition -- Potential Solutions -- Preferred Solutions -- Summary -- On-Demand Secure Code Execution on Commodity Computers -- Problem Definition -- Flicker Architecture -- Developer's Perspective -- Flicker Applications -- Performance Evaluation -- Architectural Recommendations -- Summary -- Using Trustworthy Host-Based Information in the Network -- Problem Definition -- The Assayer Architecture -- Potential Attacks -- Case Studies -- Implementation -- Evaluation -- Potential Objections -- Summary -- Verifiable Computing: Secure Code Execution Despite Untrusted Software and Hardware -- Overview -- Cryptographic Background -- Problem Definition -- An Efficient Verifiable-Computation Scheme with Input and Output Privacy -- How to Handle CheatingWorkers -- Summary -- Conclusion -- Bibliography -- Author's Biography.
    Anmerkung: Description based on publisher supplied metadata and other sources
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    New York, NY : Association for Computing Machinery | [San Rafael] : Morgan & Claypool Publishers
    ISBN: 9781627054782
    Sprache: Englisch
    Seiten: Online-Ressource (xvii, 188 Seiten)
    Ausgabe: First edition
    Serie: ACM Books 2
    Paralleltitel: Print version Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
    DDC: 303.4/83
    Schlagwort(e): Electronic books ; Konferenzschrift
    Kurzfassung: As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted.In this book, I argue that we can resolve the tension between security and features by leverag
    Beschreibung / Inhaltsverzeichnis: 4.6.3 Hardware Context Switch
    Anmerkung: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...