Atjaunināt sīkdatņu piekrišanu

E-grāmata: Trusted Computing: Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings

Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 5471
  • Izdošanas datums: 18-Feb-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642005879
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 5471
  • Izdošanas datums: 18-Feb-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642005879
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Thisvolumecontainsthe15paperspresentedinthetechnicalstrandoftheTrust 2009 conference, held in Oxford, UK in April 2009. Trust 2009 was the second international conference devoted to the technical and socio-economic aspects of trusted computing. The conference had two main strands, one devoted to technical aspects of trusted computing (addressed by these proceedings), and the other devoted to socio-economic aspects. Trust 2009 built on the successful Trust 2008 conference, held in Villach, Austria in March 2008. The proceedings of Trust 2008, containing 14 papers, were published in volume 4968 of the Lecture Notes in Computer Science series. ThetechnicalstrandofTrust2009contained15originalpapersonthedesign and application of trusted computing. For these proceedings the papers have been divided into four main categories, namely: Implementation of trusted computing Attestation PKI for trusted computing Applications of trusted computing The 15 papers included here were selected from a total of 33 submissions. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. We believe that the result is a high-quality set of papers, some of which have been signi cantly improved as a result of the refereeing process. We would also like to thank all the authors who submitted their papers to the technical strand of the Trust 2009 conference, all external referees, and all the attendees of the conference.
Implementation of Trusted Computing
Towards a Programmable TPM
1(13)
Paul England
Talha Tariq
ACPI: Design Principles and Concerns
14(15)
Loic Duflot
Olivier Levillain
Benjamin Morin
Implementation Aspects of Mobile and Embedded Trusted Computing
29(16)
Kurt Dietrich
Johannes Winter
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
45(18)
Hans Lohr
Ahmad-Reza Sadeghi
Christian Stuble
Marion Weber
Marcel Winandy
Attestation
Remote Attestation of Attribute Updates and Information Flows in a UCON System
63(18)
Mohammad Nauman
Masoom Alam
Xinwen Zhang
Tamleek Ali
Measuring Semantic Integrity for Remote Attestation
81(20)
Fabrizio Baiardi
Diego Cilea
Daniele Sgandurra
Francesco Ceccarelli
PKI for Trusted Computing
A PrivacyCA for Anonymity and Trust
101(19)
Martin Pirker
Ronald Toegl
Daniel Hein
Peter Danner
Revocation of TPM Keys
120(13)
Stefan Katzenbeisser
Klaus Kursawe
Frederic Stumpf
Applications I
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
133(20)
Timothy E. Levin
Jeffrey S. Dwoskin
Ganesha Bhaskara
Thuy D. Nguyen
Paul C. Clark
Ruby B. Lee
Cynthia E. Irvine
Terry V. Benzel
Trustable Remote Verification of Web Services
153(16)
John Lyle
Trustworthy Log Reconciliation for Distributed Virtual Organisations
169(14)
Jun Ho Huh
John Lyle
Attacking the BitLocker Boot Process
183(14)
Sven Turpe
Andreas Poller
Jan Steffan
Jan-Peter Stotz
Jan Trukenmuller
Applications II
Secure VPNs for Trusted Computing Environments
197(20)
Steffen Schulz
Ahmad-Reza Sadeghi
Merx: Secure and Privacy Preserving Delegated Payments
217(23)
Christopher Soghoian
Imad Aad
A Property-Dependent Agent Transfer Protocol
240(25)
Eimear Gallery
Aarthi Nagarajan
Vijay Varadharajan
Author Index 265