Читать книгу Trust in Computer Systems and the Cloud - Mike Bursell - Страница 3

List of Tables

Оглавление

1 Chapter 5Table 5.1: Trust from Internet layer to Link layer in the IP suiteTable 5.2: Trust from the bash shell to the login programTable 5.3: Trust from kernel to hypervisorTable 5.4: Trust from hypervisor to kernelTable 5.5: Trust relationship from web browser to laptop systemTable 5.6: Trust relationship from laptop to DNS serverTable 5.7: Trust relationship from web browser to web serverTable 5.8: Trust relationships from web browser to laptop systemTable 5.9: Trust relationship from web browser to web serverTable 5.10: Trust relationship from web browser to web serverTable 5.11: Trust relationship from web browser to web serverTable 5.12: Trust relationship from web server to web browserTable 5.13: Trust relationship from web browser to laptop systemTable 5.14: Trust relationship from web browser to web clientTable 5.15: Trust relationship from web browser to laptop systemTable 5.16: Trust relationship from web browser to web serverTable 5.17: Trust relationship from web server to host systemTable 5.18: Trust relationship from web server to host systemTable 5.19: Trust relationship from web server to acquiring bankTable 5.20: Trust relationship from web server to web browser

2 Chapter 6Table 6.1: Shipping company trust relationship without blockchain systemTable 6.2: Shipping company trust relationship with blockchain system

3 Chapter 8Table 8.1: Trust offer from a service providerTable 8.2: Trust requirements from a service consumerTable 8.3: Trust from server to logging service regarding time stamps

4 Chapter 9Table 9.1: Trust from software consumer to software vendor

5 Chapter 10Table 10.1: A comparison of cloud and Edge computingTable 10.2: Host system criteria for cloud and Edge computing environments

6 Chapter 11Table 11.1: Examples of physical system attacksTable 11.2: Trust and data in transitTable 11.3: Trust and data at restTable 11.4: Trust and data in useTable 11.5: Comparison of data protection techniques

7 Chapter 12Table 12.1: Examples of policies in trust domains

8 Chapter 13Table 13.1: Example of a trust table

Trust in Computer Systems and the Cloud

Подняться наверх