As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.
"Sinopsis" puede pertenecer a otra edición de este libro.
Microsoft Research
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 64,20 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoEUR 4,02 gastos de envío desde Reino Unido a España
Destinos, gastos y plazos de envíoLibrería: PBShop.store UK, Fairford, GLOS, Reino Unido
PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: FW-9781627054775
Cantidad disponible: 15 disponibles
Librería: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Condición: New. Num Pages: 208 pages, colour illustrations. BIC Classification: UY. Category: (G) General (US: Trade). Dimension: 236 x 193 x 16. Weight in Grams: 404. . 2014. 1st Edition. Paperback. . . . . Nº de ref. del artículo: V9781627054775
Cantidad disponible: Más de 20 disponibles
Librería: Revaluation Books, Exeter, Reino Unido
Paperback. Condición: Brand New. 188 pages. 9.00x7.50x0.50 inches. In Stock. This item is printed on demand. Nº de ref. del artículo: __1627054774
Cantidad disponible: 2 disponibles
Librería: Ria Christie Collections, Uxbridge, Reino Unido
Condición: New. In. Nº de ref. del artículo: ria9781627054775_new
Cantidad disponible: Más de 20 disponibles
Librería: California Books, Miami, FL, Estados Unidos de America
Condición: New. Nº de ref. del artículo: I-9781627054775
Cantidad disponible: Más de 20 disponibles
Librería: Kennys Bookstore, Olney, MD, Estados Unidos de America
Condición: New. Num Pages: 208 pages, colour illustrations. BIC Classification: UY. Category: (G) General (US: Trade). Dimension: 236 x 193 x 16. Weight in Grams: 404. . 2014. 1st Edition. Paperback. . . . . Books ship from the US and Ireland. Nº de ref. del artículo: V9781627054775
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 21468186-n
Cantidad disponible: Más de 20 disponibles
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
Paperback / softback. Condición: New. New copy - Usually dispatched within 4 working days. 398. Nº de ref. del artículo: B9781627054775
Cantidad disponible: Más de 20 disponibles
Librería: Majestic Books, Hounslow, Reino Unido
Condición: New. pp. 208 3:B&W 7.5 x 9.25 in or 235 x 191 mm Perfect Bound on White w/Gloss Lam. Nº de ref. del artículo: 141850017
Cantidad disponible: 3 disponibles
Librería: Rarewaves.com UK, London, Reino Unido
Paperback. Condición: New. Nº de ref. del artículo: LU-9781627054775
Cantidad disponible: Más de 20 disponibles