Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers - Parno, Bryan Jeffrey
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtreExpédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.
Nos autres offres
-
78,06 €
Produit Neuf
Ou 19,52 € /mois
- Livraison à 0,01 €
- Livré entre le 27 mai et le 5 juin
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781627054775_dbm
Voir le détail de l'annonce
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Trust Extension As A Mechanism For Secure Code Execution On Commodity Computers Format Broché - Livre Informatique
0 avis sur Trust Extension As A Mechanism For Secure Code Execution On Commodity Computers Format Broché - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
The Lines Of My Hand
1 avis
Occasion dès 79,00 €
-
Vitalogy; Or, Encyclopedia Of Health And Home
Neuf dès 51,67 €
-
Citizen Marx
Neuf dès 49,07 €
-
El Monte
Neuf dès 45,26 €
-
Gedichte
Neuf dès 46,66 €
-
Los Negros Brujos
Neuf dès 39,54 €
-
Bruegel. The Complete Works
Neuf dès 95,23 €
-
International Commercial Agreements: A Functional Primer On Drafting, Negotiating And Resolving Disputes, Third Edition
Neuf dès 52,99 €
Occasion dès 96,99 €
-
Portfolio Joubert "Les Scouts"
Occasion dès 75,00 €
-
Ocp Oracle Certified Professional Java Se 21 Developer Study Guide
Neuf dès 72,73 €
-
Joel Meyerowitz: Europa 1966-1967
Neuf dès 50,00 €
-
Complete Cthulhu Mythos Tales
1 avis
Neuf dès 50,89 €
Occasion dès 85,32 €
-
Western Technology And Soviet Economic Development 1945-1968
Neuf dès 60,23 €
-
Kodak Pixpro Fz55 :
Neuf dès 48,99 €
-
Saul Steinberg | Harold Rosenberg
Occasion dès 103,99 €
-
Ernst Haas - New York In Color, 1952-1962
1 avis
Neuf dès 49,94 €
-
Auf Der Schwelle Des Fremden: Das Leben Der Annemarie Schwarzenbach
Occasion dès 46,40 €
-
Implementing Domain-Driven Design
Neuf dès 63,38 €
-
Handbook Of Multilingualism And Multiculturalism
Neuf dès 60,00 €
Occasion dès 50,00 €
-
Mies Van Der Rohe
Occasion dès 72,32 €
Produits similaires
Présentation Trust Extension As A Mechanism For Secure Code Execution On Commodity Computers Format Broché
- Livre Informatique
Résumé :
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers....
Biographie:
Microsoft Research...
Détails de conformité du produit
Personne responsable dans l'UE