Читать книгу Trust in Computer Systems and the Cloud - Mike Bursell - Страница 4

List of Illustrations

Оглавление

1 Chapter 3Figure 3.1a: Transitive trust (direct).Figure 3.1b: Transitive trust (by referral).Figure 3.2: Chain of trust.Figure 3.3: Distributed trust to multiple entities with weak relationships....Figure 3.4: Distributed trust with a single, stronger relationship. A set of...Figure 3.5: Trust domains.Figure 3.6: Reputation: collecting information.Figure 3.7: Reputation: gathering information from multiple endorsing author...Figure 3.8: Forming a trust relationship to the trustee, having gathered inf...Figure 3.9: Deploying a workload to a public or private cloud.

2 Chapter 4Figure 4.1a: Trying to establish a new trust context with the same trustee....Figure 4.1b: A circular trust relationship.

3 Chapter 5Figure 5.1: Internet Protocol suite layers.Figure 5.2: OSI layers.Figure 5.3: Linux layering.Figure 5.4: Linux virtualisation stack.Figure 5.5: Linux container stack.Figure 5.6: A Simple Cloud Virtualisation Stack.Figure 5.7: Trust pivot—initial state.Figure 5.8: Trust pivot—processing.Figure 5.9: Trust pivot—complete.

4 Chapter 8Figure 8.1: External time source.Figure 8.2: Time as a new trust context.Figure 8.3: Linux virtualisation stack.Figure 8.4: Virtualisation stack (complex version).Figure 8.5: Host and two workloads.Figure 8.6: Isolation type 1—workload from workload.Figure 8.7: Isolation type 2—host from workload.Figure 8.8: Isolation type 3—workload from host.

5 Chapter 9Figure 9.1: Package dependencies.

6 Chapter 11Figure 11.1: TPM—host usage.Figure 11.2: TPM—guest usage.Figure 11.3: TPM—software TPM.Figure 11.4: TPM—vTPM (based on a TPM).Figure 11.5: Venn diagram of various technologies used to protect data in use...Figure 11.6: TEE instance (VM-based).Figure 11.7: TEE instance (generic).Figure 11.8: Pre-load attestation.Figure 11.9: Post-load attestation—full workload.Figure 11.10: Post-load attestation—TEE runtime.Figure 11.11: Post-load attestation—runtime loader.Figure 11.12: TEE instance (VM-based)—BIOS from the CSP.Figure 11.13: TEE trust relationships (ideal).Figure 11.14: TEE trust relationships (implicit).Figure 11.15: A complex trust model.

7 Chapter 12Figure 12.1: Trust domains in a bank.Figure 12.2: Trust domains in a bank—2.Figure 12.3: Trust domains in a bank—C's view.Figure 12.4: Trust domains in a bank—trust domain view.Figure 12.5: Trust domains in a bank—NTP view.Figure 12.6: Trust domains and the cloud—1.Figure 12.7: Trust domains and the cloud—2.Figure 12.8: Trust domains and the cloud—3.Figure 12.9: Trust domains and the cloud—4.Figure 12.10: Trust domains and the cloud—5.

Trust in Computer Systems and the Cloud

Подняться наверх