£43.29

Morgan & Claypool Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (ACM Books)

Price data last checked 14 day(s) ago - will refresh soon

View at Amazon

Price History & Forecast

Last 77 days • 77 data points (No recent data available)

Historical
Generating forecast...
£43.29 £42.80 £42.90 £43.01 £43.12 £43.23 £43.34 13 February 2026 04 March 2026 23 March 2026 11 April 2026 30 April 2026

Price Distribution

Price distribution over 77 days • 2 price levels

Days at Price
Current Price
76 days · current 1 day · current 0 19 38 57 76 £43 £43 Days at Price

Price Analysis

Most common price: £43 (76 days, 98.7%)

Price range: £43 - £43

Price levels: 2 different prices over 77 days

Description

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

Key Features

Pages Count - 208. Binding type - Perfect.

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
30 June 2014
Listed Since
22 May 2014

Barcode

No barcode data available

Similar Products You Might Like

Trusted Computing Platforms: Design and Applications
95% match

Trusted Computing Platforms: Design and Applications

Springer

£75.80 27 Feb 2026
Security, Privacy and Trust in Cloud Systems
95% match

Security, Privacy and Trust in Cloud Systems

Springer

£60.58 24 Apr 2026
Trust and Privacy in Digital Business: First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings: 3184 (Lecture Notes in Computer Science, 3184)
95% match

Trust and Privacy in Digital Business: First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings: 3184 (Lecture Notes in Computer Science, 3184)

Springer

£44.82 21 Apr 2026
Assured Cloud Computing
95% match

Assured Cloud Computing

Wiley-Blackwell

£96.65 14 Jan 2026
Collaborative, Trusted and Privacy-Aware e/m-Services: 12th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2013, Athens, ... and Communication Technology, 399)
95% match

Collaborative, Trusted and Privacy-Aware e/m-Services: 12th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2013, Athens, ... and Communication Technology, 399)

Springer

£41.45 24 Feb 2026
Springer Security with Intelligent Computing and Big-Data Services
95% match

Springer Security with Intelligent Computing and Big-Data Services

Springer

£110.28 03 Mar 2026
Trustworthy Cyber-Physical Systems Engineering: 36 (Chapman & Hall/CRC Computer and Information Science Series)
95% match

Trustworthy Cyber-Physical Systems Engineering: 36 (Chapman & Hall/CRC Computer and Information Science Series)

CRC Press

£93.00 08 Mar 2026
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings: 3225 (Lecture Notes in Computer Science, 3225)
95% match

Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings: 3225 (Lecture Notes in Computer Science, 3225)

Springer

£44.99 04 May 2026
Managing Trust in Cyberspace
95% match

Managing Trust in Cyberspace

CRC Press

£90.00 08 Mar 2026
Trustworthy Computing and Services: International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers: 320 (Communications in Computer and Information Science, 320)
95% match

Trustworthy Computing and Services: International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers: 320 (Communications in Computer and Information Science, 320)

Springer

£78.19 16 Feb 2026
Springer DepCoS-RELCOMEX 2014 Conference Proceedings
95% match

Springer DepCoS-RELCOMEX 2014 Conference Proceedings

Springer

£120.00 26 Apr 2026
Springer Theory and Applications of Dependable Computer Systems
95% match

Springer Theory and Applications of Dependable Computer Systems

Springer

£108.78 26 Apr 2026
CRC Press Opportunistic Networks - Mobility, Security & Privacy
95% match

CRC Press Opportunistic Networks - Mobility, Security & Privacy

CRC Press

£100.00 28 Apr 2026
Information Security in Diverse Computing Environments (Advances in Information Security, Privacy, and Ethics)
95% match

Information Security in Diverse Computing Environments (Advances in Information Security, Privacy, and Ethics)

Information Science Reference

£203.21 30 Jan 2026
Trust and Artificial Intelligence: Development and Application of AI Technology (Routledge Studies in Trust Research)
95% match

Trust and Artificial Intelligence: Development and Application of AI Technology (Routledge Studies in Trust Research)

Routledge

£119.60 25 Apr 2026
Trust and Security in Collaborative Computing (Computer And Network Security)
95% match

Trust and Security in Collaborative Computing (Computer And Network Security)

World Scientific Publishing Company

£66.32 12 Apr 2026
Theory and Engineering of Dependable Computer Systems and Networks: Proceedings of the Sixteenth International Conference on Dependability of Computer ... in Intelligent Systems and Computing, 1389)
95% match

Theory and Engineering of Dependable Computer Systems and Networks: Proceedings of the Sixteenth International Conference on Dependability of Computer ... in Intelligent Systems and Computing, 1389)

Springer

£105.37 01 Apr 2026
Aspects of Personal Privacy in Communications - Problems, Technology and Solutions (River Publishers Series in Communications)
95% match

Aspects of Personal Privacy in Communications - Problems, Technology and Solutions (River Publishers Series in Communications)

Taylor & Francis

£104.97 09 Mar 2026
Trust Management IV: 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010, Proceedings: 321 (IFIP Advances in Information and Communication Technology, 321)
95% match

Trust Management IV: 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010, Proceedings: 321 (IFIP Advances in Information and Communication Technology, 321)

Springer

£46.28 28 Feb 2026
Security in Computing
95% match

Security in Computing

Addison Wesley

£87.62 12 Jan 2026
Dependable Computing: Design and Assessment (IEEE Press)
95% match

Dependable Computing: Design and Assessment (IEEE Press)

Wiley-IEEE Press

£91.15 30 Apr 2026
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers: 6561 (Lecture Notes in Computer Science, 6561)
95% match

Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers: 6561 (Lecture Notes in Computer Science, 6561)

Springer

£41.83 06 Mar 2026
Security in Computing
95% match

Security in Computing

PEARSON EDUCATION

£77.93 16 Mar 2026
Information Security and Employee Behaviour: How to Reduce Risk Through Employee Education, Training and Awareness
95% match

Information Security and Employee Behaviour: How to Reduce Risk Through Employee Education, Training and Awareness

Routledge

£133.40 18 Apr 2026