1Introduction
With rapid development of cloud computing, Internet of Things and mobile Internet, information technology has changed society management and public life profoundly, and ubiquitous information has already been treated as important digital assets of a nation, an enterprise or a person. Considering widespread computer virus, malicious software and enhanced hacker technique, these important assets are facing more and more practical threats. It is no doubt a preferential security requirement from nation, enterprise and person that a trustworthy computing environment should be built to maintain confidentiality, integrity, authenticity and reliability of information. Traditional security technologies like firewall, IDS and virus defense ...
Get Trusted Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.