This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.
1.1 Trust and Computing We should probably first begin with some definitions. This book uses the term trusted computing platform (TCP) in its title and throughout the text, because that is the term the community has come to use for this ...
... Fiammante, Jones, and Shah ISBN 0131870025 RATIONAL AND SOFTWARE DEVELOPMENT IBM Rational® ClearCase®, Ant, and CruiseControl Lee ISBN 0321356993 IBM® Rational® Unified Process® Reference and Certification Guide Shuja and Krebs ISBN ...
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future.
A set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information.
This book provides a discussion on a wide variety of viewpoints on some of the main challenges facing secure systems.
Busch, H., Sot ́akov ́a, M., Katzenbeisser, S., Sion, R.: The PUF promise. In: Proceedings of the International Conference on Trust and Trustworthy Computing (2010) (Referenced on page 39.) Bussani, A., Griffin, J.L., Jansen, B., ...
The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced ...
The book summarizes key concepts and theories in trusted computing, e.g.
Guide to Understanding Trusted Distribution in Trusted Systems
' Financial Times The 'Orange Book' Series, produced by the American Department of Defense is as yet the only guide to effective computer security for both military and commercial sectors.