Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Secure Boot

Handbook of Research on Secure Multimedia Distribution
In contrast to the trusted boot where all components are only measured and reported secure boot requires an internal verifier which decides on every step of boot if the boot will continue or not. At the end of the boot process the system is in a fully checked status.
Published in Chapter:
Trust in the Value-Creation Chain of Multimedia Goods
Andreas U. Schmidt (CREATE-NET Research Centre, Italy) and Nicolai Kuntze (Fraunhofer Institute for Secure Information Technology, Germany)
Copyright: © 2009 |Pages: 22
DOI: 10.4018/978-1-60566-262-6.ch021
Abstract
Security in the value creation chain hinges on many single components and their interrelations. Trusted Platforms open ways to fulfil the pertinent requirements. This chapter gives a systematic approach to the utilisation of trusted computing platforms over the whole lifecycle of multimedia products. This spans production, aggregation, (re)distribution, consumption, and charging. Trusted Computing technology as specified by the Trusted Computing Group provides modular building blocks which can be utilized at many points in the multimedia lifecycle. We propose an according research roadmap beyond the conventional Digital Rights Management use case. Selected technical concepts illustrate the principles of Trusted Computing applications in the multimedia context.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR