000 | 02885naaaa2200421uu 4500 | ||
---|---|---|---|
001 | https://library.oapen.org/handle/20.500.12657/42904 | ||
003 | oapen | ||
005 | 20230403134706.0 | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20201113s2018 xx |||||o ||| eng|| d | ||
040 |
_aoapen _coapen |
||
041 | 0 | _aeng | |
042 | _adc | ||
080 | _a004 | ||
100 | 1 |
_aLysne, Olav _4auth |
|
245 | 1 | 0 |
_aThe Huawei and Snowden Questions _bCan Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? |
260 |
_bSpringer Nature _c2018 |
||
300 | _a1 electronic resource (116 p.) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 |
_aSimula SpringerBriefs on Computing _vv.4 |
|
506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
520 | _aThis open access book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security. This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states. | ||
540 |
_aCreative Commons _fby/4.0/ _2cc |
||
546 | _aEnglish | ||
650 | 0 |
_aКриптография, безопасность _92233 |
|
653 | _aКонфиденциальность и защита данных | ||
653 | _aИнформационная архитектура | ||
653 | _aКомпьютерная техника | ||
653 | _aКибербезопасность | ||
830 |
_94507 _aSimula SpringerBriefs on Computing _vv.2 |
||
856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/id/621698d1-c5ef-4160-99e0-5f763d8181f5/2018_Book_TheHuaweiAndSnowdenQuestions.pdf _70 _zDownload |
856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/handle/20.500.12657/42904 _70 _zDescription |
909 |
_c4 _dDarya Shvetsova |
||
942 |
_2udc _cEE |
||
999 |
_c6118 _d6118 |