Mike Bursell - Trust in Computer Systems and the Cloud

Здесь есть возможность читать онлайн «Mike Bursell - Trust in Computer Systems and the Cloud» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Trust in Computer Systems and the Cloud: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Trust in Computer Systems and the Cloud»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity 
Trust in Computer Systems and the Cloud The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. 
Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, 
 is also an indispensable addition to the libraries of system architects, security system engineers, and master’s students in software architecture and security.

Trust in Computer Systems and the Cloud — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Trust in Computer Systems and the Cloud», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

5 Chapter 9Figure 9.1: Package dependencies.

6 Chapter 11Figure 11.1: TPM—host usage.Figure 11.2: TPM—guest usage.Figure 11.3: TPM—software TPM.Figure 11.4: TPM—vTPM (based on a TPM).Figure 11.5: Venn diagram of various technologies used to protect data in use...Figure 11.6: TEE instance (VM-based).Figure 11.7: TEE instance (generic).Figure 11.8: Pre-load attestation.Figure 11.9: Post-load attestation—full workload.Figure 11.10: Post-load attestation—TEE runtime.Figure 11.11: Post-load attestation—runtime loader.Figure 11.12: TEE instance (VM-based)—BIOS from the CSP.Figure 11.13: TEE trust relationships (ideal).Figure 11.14: TEE trust relationships (implicit).Figure 11.15: A complex trust model.

7 Chapter 12Figure 12.1: Trust domains in a bank.Figure 12.2: Trust domains in a bank—2.Figure 12.3: Trust domains in a bank—C's view.Figure 12.4: Trust domains in a bank—trust domain view.Figure 12.5: Trust domains in a bank—NTP view.Figure 12.6: Trust domains and the cloud—1.Figure 12.7: Trust domains and the cloud—2.Figure 12.8: Trust domains and the cloud—3.Figure 12.9: Trust domains and the cloud—4.Figure 12.10: Trust domains and the cloud—5.

Guide

1 Cover Page

2 Table of Contents

3 Title Page Trust in Computer Systems and the Cloud Mike Bursell

4 Copyright

5 Dedication

6 About the Author

7 About the Technical Editor

8 Acknowledgements

9 Introduction

10 Begin Reading

11 References

12 Index

13 End User License Agreement

Pages

1 i

2 iii

3 xv

4 xvi

5 xvii

6 1

7 2

8 3

9 4

10 5

11 6

12 7

13 8

14 9

15 10

16 11

17 12

18 13

19 14

20 15

21 16

22 17

23 18

24 19

25 20

26 21

27 22

28 23

29 24

30 25

31 26

32 27

33 28

34 29

35 30

36 31

37 32

38 33

39 34

40 35

41 36

42 37

43 38

44 39

45 40

46 41

47 42

48 43

49 44

50 45

51 46

52 47

53 48

54 49

55 50

56 51

57 52

58 53

59 54

60 55

61 56

62 57

63 58

64 59

65 60

66 61

67 62

68 63

69 64

70 65

71 66

72 67

73 68

74 69

75 70

76 71

77 72

78 73

79 74

80 75

81 76

82 77

83 78

84 79

85 80

86 81

87 82

88 83

89 84

90 85

91 86

92 87

93 88

94 89

95 90

96 91

97 93

98 94

99 95

100 96

101 97

102 98

103 99

104 100

105 101

106 102

107 103

108 104

109 105

110 106

111 107

112 108

113 109

114 110

115 111

116 112

117 113

118 114

119 115

120 116

121 117

122 118

123 119

124 120

125 121

126 122

127 123

128 124

129 125

130 126

131 127

132 128

133 129

134 130

135 131

136 132

137 133

138 134

139 135

140 136

141 137

142 138

143 139

144 140

145 141

146 142

147 143

148 144

149 145

150 146

151 147

152 148

153 149

154 150

155 151

156 152

157 153

158 154

159 155

160 156

161 157

162 158

163 159

164 160

165 161

166 162

167 163

168 164

169 165

170 166

171 167

172 168

173 169

174 170

175 171

176 172

177 173

178 174

179 175

180 176

181 177

182 178

183 179

184 180

185 181

186 182

187 183

188 185

189 186

190 187

191 188

192 189

193 190

194 191

195 192

196 193

197 194

198 195

199 196

200 197

201 198

202 199

203 200

204 201

205 202

206 203

207 204

208 205

209 206

210 207

211 208

212 209

213 211

214 212

215 213

216 214

217 215

218 216

219 217

220 218

221 219

222 220

223 221

224 222

225 223

226 224

227 225

228 226

229 227

230 228

231 229

232 230

233 231

234 233

235 234

236 235

237 236

238 237

239 238

240 239

241 240

242 241

243 242

244 243

245 244

246 245

247 246

248 247

249 248

250 249

251 250

252 251

253 252

254 253

255 254

256 255

257 256

258 257

259 258

260 259

261 260

262 261

263 262

264 263

265 264

266 265

267 266

268 267

269 268

270 269

271 270

272 271

273 272

274 273

275 274

276 275

277 276

278 277

279 278

280 279

281 281

282 282

283 283

284 284

285 285

286 286

287 287

288 288

289 289

290 290

291 291

292 292

293 293

294 294

295 295

296 296

297 297

298 298

299 299

300 300

301 301

302 302

303 303

304 304

305 305

306 306

307 307

308 309

309 310

310 311

311 312

312 313

313 314

314 315

315 316

316 317

317 318

318 319

319 321

320 322

321 323

322 324

323 325

324 326

325 327

326 328

327 329

328 330

329 331

330 332

331 333

332 334

333 iv

334 v

335 vi

336 vii

337 viii

338 ix

339 335

Praise for Trust in Computer Systems and the Cloud

“The problem is that when you use the word trust, people think they know what you mean. It turns out that they almost never do.” With this singular statement, Bursell has defined both the premise and the value he expounds in this insightful treatise spanning the fundamentals and complexities of digital trust. Operationalizing trust is foundational to effective human and machine digital relationships, with Bursell leading the reader on a purposeful journey expressing and consuming elements of digital trust across current and future-relevant data lifecycles.

—Kurt Roemer,

Chief Security Strategist and Office of the CTO, Citrix

Trust is a matter of context. Specifically, “context” is one of the words most repeated in this book, and I must say that its use is justified in all cases. Not only is the meaning of trust analysed in all possible contexts, including some essential philosophical and psychological foundations, but the concept is also applied to all possible ICT contexts, from basic processor instructions to cloud and edge infrastructures; and different trust frameworks are explored, from hierarchical (CAs) to distributed (DLTs) approaches. A must-read book to understand how one of the bases of human civilization can and must be applied in the digital world.

—Dr. Diego R. Lopez,

Head of Technology Exploration, Telefónica and Chair of ETSI blockchain initiative

As we have moved to the digital society, appreciating what and what not to trust is paramount if you use computer systems and/or the cloud. You will be well prepared when you have read this book.

—Professor Peter Landrock, D.Sc. (hon),

Founder of Cryptomathic

Trust is a complex and important concept in network security. Bursell neatly unpacks it in this detailed and readable book.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Trust in Computer Systems and the Cloud»

Представляем Вашему вниманию похожие книги на «Trust in Computer Systems and the Cloud» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Trust in Computer Systems and the Cloud»

Обсуждение, отзывы о книге «Trust in Computer Systems and the Cloud» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x