Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Bootstrapping Trust in Modern Computers, PDF eBook

Bootstrapping Trust in Modern Computers PDF

Part of the SpringerBriefs in Computer Science series

PDF

Please note: eBooks can only be purchased with a UK issued credit card and all our eBooks (ePub and PDF) are DRM protected.

Description

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state.

We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data).

Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer.

We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans.

This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.

Information

Information

Also in the SpringerBriefs in Computer Science series  |  View all