Distributed usage control allows to regulate the use of data even after sharing. However, existing solutions are susceptible to manipulation by dishonest data receivers. This work investigates the use of trusted computing to achieve a trustworthy usage control enforcement process. For this, a suitable system architecture and several remote attestation protocols are designed and implemented. The resulting usage control framework is evaluated using a smart manufacturing application scenario.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Distributed usage control allows to regulate the use of data even after sharing. However, existing solutions are susceptible to manipulation by dishonest data receivers. This work investigates the use of trusted computing to achieve a trustworthy usage control enforcement process. For this, a suitable system architecture and several remote attestation protocols are designed and implemented. The resulting usage control framework is evaluated using a smart manufacturing application scenario. 414 pp. Englisch. Bestandsnummer des Verkäufers 9783731513902
Anzahl: 2 verfügbar
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments | Paul Georg Wagner | Taschenbuch | Englisch | KIT Scientific Publishing | EAN 9783731513902 | Verantwortliche Person für die EU: KIT Scientific Publishing, Straße am Forum 2, 76131 Karlsruhe, info[at]ksp[dot]kit[dot]edu | Anbieter: preigu. Bestandsnummer des Verkäufers 131544642
Anzahl: 5 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Distributed usage control allows to regulate the use of data even after sharing. However, existing solutions are susceptible to manipulation by dishonest data receivers. This work investigates the use of trusted computing to achieve a trustworthy usage control enforcement process. For this, a suitable system architecture and several remote attestation protocols are designed and implemented. The resulting usage control framework is evaluated using a smart manufacturing application scenario. Bestandsnummer des Verkäufers 9783731513902
Anzahl: 2 verfügbar