Ingyenes szállítás a Packetával, 19 990 Ft feletti vásárlás esetén
Posta 1 795 Ft DPD 1 995 Ft PostaPont / Csomagautomata 1 690 Ft Postán 1 690 Ft GLS futár 1 590 Ft Packeta 990 Ft GLS pont 1 390 Ft

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers

Nyelv AngolAngol
Könyv Kemény kötésű
Könyv Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Bryan Jeffrey Parno
Libristo kód: 10805630
Kiadó Morgan & Claypool Publishers, június 2014
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate... Teljes leírás
? points 245 b
39 209 Ft
Beszállítói készleten Küldés 14-18 napon belül

30 nap a termék visszaküldésére


Ezt is ajánljuk


The Hidden Reality Brian Greene / Puha kötésű
common.buy 6 626 Ft
The Course of Honour Lindsey Davis / Puha kötésű
common.buy 7 746 Ft
The Prairie That Nature Built Marybeth Lorbiecki / Kemény kötésű
common.buy 6 038 Ft
Pittsburgh Penguins Laura Winters / Kemény kötésű
common.buy 12 552 Ft
The Tory Widow Christine Blevins / Puha kötésű
common.buy 8 911 Ft
Vietnam Wars Marilyn B. Young / Puha kötésű
common.buy 6 391 Ft
Mittens, Where Is Max? Lola M. Schaefer / Kemény kötésű
common.buy 7 219 Ft
Boat Full of Animals Jennifer Rees Larcombe / Puha kötésű
common.buy 3 451 Ft
Smallville David Ekstrom / DVD
common.buy 7 265 Ft
Heut start ma durch Die Pagger Buam / Audio CD
common.buy 7 158 Ft

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

Információ a könyvről

Teljes megnevezés Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
Nyelv Angol
Kötés Könyv - Kemény kötésű
Kiadás éve 2014
Oldalszám 207
EAN 9781627055451
ISBN 9781627055451
Libristo kód 10805630
Súly 594
Méretek 191 x 235 x 16
Ajándékozza oda ezt a könyvet még ma
Nagyon egyszerű
1 Tegye a kosárba könyvet, és válassza ki a kiszállítás ajándékként opciót 2 Rögtön küldjük Önnek az utalványt 3 A könyv megérkezik a megajándékozott címére

Belépés

Bejelentkezés a saját fiókba. Még nincs Libristo fiókja? Hozza létre most!

 
kötelező
kötelező

Nincs fiókja? Szerezze meg a Libristo fiók kedvezményeit!

A Libristo fióknak köszönhetően mindent a felügyelete alatt tarthat.

Libristo fiók létrehozása