Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bundesamt für Sicherheit in der Informationstechnik, www.bsi.de/sichere_plattformen/trustcomp/infos/tpm_report/tpm_grundlagen.html
Genode Operating System Framework, http://genode.org/
P. Dietrich, DRM und Trusted Computing – Herr der eigenen Hardware?, Master Thesis, Hochschule der Medien Stuttgart 2006
B. Schneier, Do We Really Need a Security Industry? Wired Magazine, May 2007, http://tinyurl.com/23b3av
M. Seeger, The current state of anonymous filesharing, BSc. Thesis, Hochschule der Medien Stuttgart 2008, http://www.marc-seeger.de/ wp-content/uploads/2008/07/thesis-the-current-state-of-anonymous-filesharing.pdf
Secure Microkernel Project, http://ertos.nicta.com.au/research/sel4/
N. Stephenson, Die Diktatur des schönen Scheins – Wie grafische Oberflächen die Computernutzer entmündigen, Goldmann-Verlag 2002
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schmitz, R., Kriha, W. (2009). Schlussbetrachtungen. In: Sichere Systeme. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78959-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-78959-8_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78958-1
Online ISBN: 978-3-540-78959-8
eBook Packages: Computer Science and Engineering (German Language)