Trust in Computer Systems and the Cloud. Mike Bursell
Чтение книги онлайн.
Читать онлайн книгу Trust in Computer Systems and the Cloud - Mike Bursell страница 2
17 CHAPTER 13: A World of Explicit Trust Tools for Trust The Role of the Architect Coda Note
18 References
19 Index
20 Copyright
21 Dedication
List of Tables
1 Chapter 5Table 5.1: Trust from Internet layer to Link layer in the IP suiteTable 5.2: Trust from the bash shell to the login programTable 5.3: Trust from kernel to hypervisorTable 5.4: Trust from hypervisor to kernelTable 5.5: Trust relationship from web browser to laptop systemTable 5.6: Trust relationship from laptop to DNS serverTable 5.7: Trust relationship from web browser to web serverTable 5.8: Trust relationships from web browser to laptop systemTable 5.9: Trust relationship from web browser to web serverTable 5.10: Trust relationship from web browser to web serverTable 5.11: Trust relationship from web browser to web serverTable 5.12: Trust relationship from web server to web browserTable 5.13: Trust relationship from web browser to laptop systemTable 5.14: Trust relationship from web browser to web clientTable 5.15: Trust relationship from web browser to laptop systemTable 5.16: Trust relationship from web browser to web serverTable 5.17: Trust relationship from web server to host systemTable 5.18: Trust relationship from web server to host systemTable 5.19: Trust relationship from web server to acquiring bankTable 5.20: Trust relationship from web server to web browser
2 Chapter 6Table 6.1: Shipping company trust relationship without blockchain systemTable 6.2: Shipping company trust relationship with blockchain system
3 Chapter 8Table 8.1: Trust offer from a service providerTable 8.2: Trust requirements from a service consumerTable 8.3: Trust from server to logging service regarding time stamps
4 Chapter 9Table 9.1: Trust from software consumer to software vendor
5 Chapter 10Table 10.1: A comparison of cloud and Edge computingTable 10.2: Host system criteria for cloud and Edge computing environments
6 Chapter 11Table 11.1: Examples of physical system attacksTable 11.2: Trust and data in transitTable 11.3: Trust and data at restTable 11.4: Trust and data in useTable 11.5: Comparison of data protection techniques
7 Chapter 12Table 12.1: Examples of policies in trust domains
8 Chapter 13Table 13.1: Example of a trust table
List of Illustrations
1 Chapter 3Figure 3.1a: Transitive trust (direct).Figure 3.1b: Transitive trust (by referral).Figure 3.2: Chain of trust.Figure 3.3: Distributed trust to multiple entities with weak relationships....Figure 3.4: Distributed trust with a single, stronger relationship. A set of...Figure 3.5: Trust domains.Figure 3.6: Reputation: collecting information.Figure 3.7: Reputation: gathering information from multiple endorsing author...Figure 3.8: Forming a trust relationship to the trustee, having gathered inf...Figure 3.9: Deploying a workload to a public or private cloud.
2 Chapter 4Figure 4.1a: Trying to establish a new trust context with the same trustee....Figure 4.1b: A circular trust relationship.
3 Chapter 5Figure 5.1: Internet Protocol suite layers.Figure 5.2: OSI layers.Figure 5.3: Linux layering.Figure 5.4: Linux virtualisation stack.Figure 5.5: Linux container stack.Figure 5.6: A Simple Cloud Virtualisation Stack.Figure 5.7: Trust pivot—initial state.Figure 5.8: Trust pivot—processing.Figure 5.9: Trust pivot—complete.
4 Chapter 8Figure 8.1: External time source.Figure 8.2: Time as a new trust context.Figure 8.3: Linux virtualisation stack.Figure 8.4: Virtualisation stack (complex version).Figure 8.5: Host and two workloads.Figure 8.6: Isolation type 1—workload from workload.Figure 8.7: Isolation type 2—host from workload.Figure 8.8: Isolation type 3—workload from host.
5 Chapter 9Figure 9.1: Package dependencies.
6 Chapter 11Figure 11.1: TPM—host usage.Figure 11.2: TPM—guest usage.Figure 11.3: TPM—software TPM.Figure 11.4: TPM—vTPM (based on a TPM).Figure 11.5: Venn diagram of various technologies used to protect data in use...Figure 11.6: TEE instance (VM-based).Figure 11.7: TEE instance (generic).Figure 11.8: Pre-load attestation.Figure 11.9: Post-load attestation—full workload.Figure 11.10: Post-load attestation—TEE runtime.Figure 11.11: Post-load attestation—runtime loader.Figure 11.12: TEE instance (VM-based)—BIOS from the CSP.Figure 11.13: TEE trust relationships (ideal).Figure 11.14: TEE trust relationships (implicit).Figure 11.15: A complex trust model.
7 Chapter 12Figure 12.1: Trust domains in a bank.Figure 12.2: Trust domains in a bank—2.Figure 12.3: Trust domains in a bank—C's view.Figure 12.4: Trust domains in a bank—trust domain view.Figure 12.5: Trust domains in a bank—NTP view.Figure 12.6: Trust domains and the cloud—1.Figure 12.7: Trust domains and the cloud—2.Figure 12.8: Trust domains and the cloud—3.Figure 12.9: Trust domains and the cloud—4.Figure 12.10: Trust domains and the cloud—5.
Guide