000 | 02661nam a22003855i 4500 | ||
---|---|---|---|
001 | 288546 | ||
003 | MX-SnUAN | ||
005 | 20160429154632.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2011 xxu| o |||| 0|eng d | ||
020 |
_a9781461414605 _99781461414605 |
||
024 | 7 |
_a10.1007/9781461414605 _2doi |
|
035 | _avtls000340595 | ||
039 | 9 |
_a201509030826 _bVLOAD _c201404300417 _dVLOAD _y201402061029 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aTK5105.5-5105.9 | |
100 | 1 |
_aParno, Bryan. _eautor _9318340 |
|
245 | 1 | 0 |
_aBootstrapping Trust in Modern Computers / _cby Bryan Parno, Jonathan M. McCune, Adrian Perrig. |
264 | 1 |
_aNew York, NY : _bSpringer New York, _c2011. |
|
300 |
_aIx, 101 páginas 10 ilustraciones _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5768 ; _v10 |
|
500 | _aSpringer eBooks | ||
520 | _aTrusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aMcCune, Jonathan M. _eautor _9318341 |
|
700 | 1 |
_aPerrig, Adrian. _eautor _9318342 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9781461414599 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-1-4614-1460-5 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c288546 _d288546 |