Atjaunināt sīkdatņu piekrišanu

Trusted Systems: First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings 2010 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 263 pages, weight: 428 g, 64 Illustrations, black and white; XIV, 263 p. 64 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 6163
  • Izdošanas datums: 15-Jul-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642145965
  • ISBN-13: 9783642145964
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 263 pages, weight: 428 g, 64 Illustrations, black and white; XIV, 263 p. 64 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 6163
  • Izdošanas datums: 15-Jul-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642145965
  • ISBN-13: 9783642145964
Citas grāmatas par šo tēmu:
This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.
Invited Talk
On Design of a Trusted Software Base with Support of TPCM
1(15)
Wenchang Shi
Secure Storage
External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing
16(23)
Jan-Erik Ekberg
N. Asokan
A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks
39(21)
T. Paul Parker
Shouhuai Xu
Attestation
Remote Attestation on Function Execution
60(13)
Liang Gu
Yueqiang Cheng
Xuhua Ding
Robert H. Deng
Yao Guo
Weizhong Shao
Scalable Remote Attestation with Privacy Protection
73(15)
Tamleek Ali Tanveer
Masoom Alam
Mohammad Nauman
Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation
88(16)
Kurt Dietrich
Trusted Network
SocialClouds: Concept, Security Architecture and Some Mechanisms
104(25)
Shouhuai Xu
Moti Yung
Privacy Enhanced Trusted Network Connect
129(17)
Ingo Bente
Joerg Vieweg
Josef von Helden
Research on Multistage Interconnection Architecture and Collision Detection Model
146(10)
Mengmeng Li
Yong Zhao
Virtualization
Trusted Virtual Domains - Design, Implementation and Lessons Learned
156(24)
Luigi Catuogno
Alexandra Dmitrienko
Konrad Eriksson
Dirk Kuhlmann
Gianluca Ramunno
Ahmad-Reza Sadeghi
Steffen Schulz
Matthias Schunter
Marcel Winandy
Jing Zhan
Trusted Integrity Measurement and Reporting for Virtualized Platforms
180(17)
Serdar Cabuk
Liqun Chen
David Plaquin
Mark Ryan
Applications
A Feather-Weight Application Isolation Model
197(15)
Jianhua Liao
Yong Zhao
Changxiang Shen
Exploring Trust of Mobile Applications Based on User Behaviors
212(15)
Zheng Yan
Yan Dong
Valtteri Niemi
Guoliang Yu
Trusted Firmware Services Based on TPM
227(9)
Zhenlong Du
Xiaoli Li
Kangkang Shen
Supporting Technology
Improved Cryptanalysis of the FOX Block Cipher
236(14)
Zhongming Wu
Yiyuan Luo
Xuejia Lai
Bo Zhu
Bitwise Higher Order Differential Cryptanalysis
250(13)
Bo Zhu
Kefei Chen
Xuejia Lai
Author Index 263