Cargando…

Trust and Trustworthy Computing Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings /

This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June 21-23, 2010. TRUST is a rapidly growing forum for research on the technical and soc- economic aspects of trustworthy infrastr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Acquisti, Alessandro (Editor ), Smith, Sean W. (Editor ), Sadeghi, Ahmad-Reza (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6101
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Technical Strand-Full Papers
  • Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
  • SBAP: Software-Based Attestation for Peripherals
  • Key Attestation from Trusted Execution Environments
  • Anonymous Authentication with TLS and DAA
  • Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation
  • Towards a Trusted Mobile Desktop
  • Application of Trusted Computing in Automation to Prevent Product Piracy
  • Lagrangian E-Voting: Verifiability on Demand and Strong Privacy
  • ?TSS - A Simplified Trusted Software Stack
  • Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
  • A DAA Scheme Using Batch Proof and Verification
  • A Pairing-Based DAA Scheme Further Reducing TPM Resources
  • An Anonymous Attestation Scheme with Optional Traceability
  • Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing
  • SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
  • Technical Strand-Short Papers
  • Escrowed Data and the Digital Envelope
  • Engineering Attestable Services
  • Dynamic Enforcement of Platform Integrity
  • An Improved Memory Integrity Protection Scheme
  • Robust Combiners for Software Hardening
  • The PUF Promise
  • Socio-Economic Strand
  • Privacy Requirements Engineering for Trustworthy e-Government Services
  • Can Competitive Insurers Improve Network Security?
  • Nudge: Intermediaries' Role in Interdependent Network Security
  • How the Public Views Strategies Designed to Reduce the Threat of Botnets
  • Axiomatic and Behavioural Trust
  • The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.org
  • The Role of Soft Information in Trust Building: Evidence from Online Social Lending
  • Software on the Witness Stand: What Should It Take for Us to Trust It?
  • Workshop on Trust in the Cloud
  • Token-Based Cloud Computing
  • Workshop on Security Hardware
  • Oblivious Transfer Based on Physical Unclonable Functions.