Эротические рассказы

Trust in Computer Systems and the Cloud. Mike BursellЧитать онлайн книгу.

Trust in Computer Systems and the Cloud - Mike Bursell


Скачать книгу
rel="nofollow" href="#ulink_17f85d1f-e6de-5356-9394-49a94b1f1a75">Tools for Trust The Role of the Architect Coda Note

      18  References

      19  Index

      20  Copyright

      21  Dedication

      22  About the Author

      23  About the Technical Editor

      24  Acknowledgements

      25  End User License Agreement

      List of Tables

      1 Chapter 5Table 5.1: Trust from Internet layer to Link layer in the IP suiteTable 5.2: Trust from the bash shell to the login programTable 5.3: Trust from kernel to hypervisorTable 5.4: Trust from hypervisor to kernelTable 5.5: Trust relationship from web browser to laptop systemTable 5.6: Trust relationship from laptop to DNS serverTable 5.7: Trust relationship from web browser to web serverTable 5.8: Trust relationships from web browser to laptop systemTable 5.9: Trust relationship from web browser to web serverTable 5.10: Trust relationship from web browser to web serverTable 5.11: Trust relationship from web browser to web serverTable 5.12: Trust relationship from web server to web browserTable 5.13: Trust relationship from web browser to laptop systemTable 5.14: Trust relationship from web browser to web clientTable 5.15: Trust relationship from web browser to laptop systemTable 5.16: Trust relationship from web browser to web serverTable 5.17: Trust relationship from web server to host systemTable 5.18: Trust relationship from web server to host systemTable 5.19: Trust relationship from web server to acquiring bankTable 5.20: Trust relationship from web server to web browser

      2 Chapter 6Table 6.1: Shipping company trust relationship without blockchain systemTable 6.2: Shipping company trust relationship with blockchain system

      3 Chapter 8Table 8.1: Trust offer from a service providerTable 8.2: Trust requirements from a service consumerTable 8.3: Trust from server to logging service regarding time stamps

      4 Chapter 9Table 9.1: Trust from software consumer to software vendor

      5 Chapter 10Table 10.1: A comparison of cloud and Edge computingTable 10.2: Host system criteria for cloud and Edge computing environments

      6 Chapter 11Table 11.1: Examples of physical system attacksTable 11.2: Trust and data in transitTable 11.3: Trust and data at restTable 11.4: Trust and data in useTable 11.5: Comparison of data protection techniques

      7 Chapter 12Table 12.1: Examples of policies in trust domains

      8 Chapter 13Table 13.1: Example of a trust table

      List of Illustrations

      1 Chapter 3Figure 3.1a: Transitive trust (direct).Figure 3.1b: Transitive trust (by referral).Figure 3.2: Chain of trust.Figure 3.3: Distributed trust to multiple entities with weak relationships....Figure 3.4: Distributed trust with a single, stronger relationship. A set of...Figure 3.5: Trust domains.Figure 3.6: Reputation: collecting information.Figure 3.7: Reputation: gathering information from multiple endorsing author...Figure 3.8: Forming a trust relationship to the trustee, having gathered inf...Figure 3.9: Deploying a workload to a public or private cloud.

      2 Chapter 4Figure 4.1a: Trying to establish a new trust context with the same trustee....Figure 4.1b: A circular trust relationship.

      3 Chapter 5Figure 5.1: Internet Protocol suite layers.Figure 5.2: OSI layers.Figure 5.3: Linux layering.Figure 5.4: Linux virtualisation stack.Figure 5.5: Linux container stack.Figure 5.6: A Simple Cloud Virtualisation Stack.Figure 5.7: Trust pivot—initial state.Figure 5.8: Trust pivot—processing.Figure 5.9: Trust pivot—complete.

      4 Chapter 8Figure 8.1: External time source.Figure 8.2: Time as a new trust context.Figure 8.3: Linux virtualisation stack.Figure 8.4: Virtualisation stack (complex version).Figure 8.5: Host and two workloads.Figure 8.6: Isolation type 1—workload from workload.Figure 8.7: Isolation type 2—host from workload.Figure 8.8: Isolation type 3—workload from host.

      5 Chapter 9Figure 9.1: Package dependencies.

      6 Chapter 11Figure 11.1: TPM—host usage.Figure 11.2: TPM—guest usage.Figure 11.3: TPM—software TPM.Figure 11.4: TPM—vTPM (based on a TPM).Figure 11.5: Venn diagram of various technologies used to protect data in use...Figure 11.6: TEE instance (VM-based).Figure 11.7: TEE instance (generic).Figure 11.8: Pre-load attestation.Figure 11.9: Post-load attestation—full workload.Figure 11.10: Post-load attestation—TEE runtime.Figure 11.11: Post-load attestation—runtime loader.Figure 11.12: TEE instance (VM-based)—BIOS from the CSP.Figure 11.13: TEE trust relationships (ideal).Figure 11.14: TEE trust relationships (implicit).Figure 11.15: A complex trust model.

      7 Chapter 12Figure 12.1: Trust domains in a bank.Figure 12.2: Trust domains in a bank—2.Figure 12.3: Trust domains in a bank—C's view.Figure 12.4: Trust domains in a bank—trust domain view.Figure 12.5: Trust domains in a bank—NTP view.Figure 12.6: Trust domains and the cloud—1.Figure 12.7: Trust domains and the cloud—2.Figure 12.8: Trust domains and the cloud—3.Figure 12.9: Trust domains and the cloud—4.Figure 12.10: Trust domains and the cloud—5.

      Guide

      1  Cover Page

      2  Table of Contents

      3  Title Page

      4  Copyright

      5  Dedication

      6  About the Author

      7  About the Technical Editor

      8  Acknowledgements

      9  Introduction

      10  Begin Reading

      11 


Скачать книгу
Яндекс.Метрика