000 02885naaaa2200421uu 4500
001 https://library.oapen.org/handle/20.500.12657/42904
003 oapen
005 20230403134706.0
006 m o d
007 cr|mn|---annan
008 20201113s2018 xx |||||o ||| eng|| d
040 _aoapen
_coapen
041 0 _aeng
042 _adc
080 _a004
100 1 _aLysne, Olav
_4auth
245 1 0 _aThe Huawei and Snowden Questions
_bCan Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
260 _bSpringer Nature
_c2018
300 _a1 electronic resource (116 p.)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aSimula SpringerBriefs on Computing
_vv.4
506 0 _aOpen Access
_2star
_fUnrestricted online access
520 _aThis open access book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security. This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.
540 _aCreative Commons
_fby/4.0/
_2cc
546 _aEnglish
650 0 _aКриптография, безопасность
_92233
653 _aКонфиденциальность и защита данных
653 _aИнформационная архитектура
653 _aКомпьютерная техника
653 _aКибербезопасность
830 _94507
_aSimula SpringerBriefs on Computing
_vv.2
856 4 0 _awww.oapen.org
_uhttps://library.oapen.org/bitstream/id/621698d1-c5ef-4160-99e0-5f763d8181f5/2018_Book_TheHuaweiAndSnowdenQuestions.pdf
_70
_zDownload
856 4 0 _awww.oapen.org
_uhttps://library.oapen.org/handle/20.500.12657/42904
_70
_zDescription
909 _c4
_dDarya Shvetsova
942 _2udc
_cEE
999 _c6118
_d6118