Atjaunināt sīkdatņu piekrišanu

E-grāmata: Trusted Systems: First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings

Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 6163
  • Izdošanas datums: 10-Jul-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642145971
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 6163
  • Izdošanas datums: 10-Jul-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642145971
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.
Invited Talk
On Design of a Trusted Software Base with Support of TPCM
1(15)
Wenchang Shi
Secure Storage
External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing
16(23)
Jan-Erik Ekberg
N. Asokan
A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks
39(21)
T. Paul Parker
Shouhuai Xu
Attestation
Remote Attestation on Function Execution
60(13)
Liang Gu
Yueqiang Cheng
Xuhua Ding
Robert H. Deng
Yao Guo
Weizhong Shao
Scalable Remote Attestation with Privacy Protection
73(15)
Tamleek Ali Tanveer
Masoom Alam
Mohammad Nauman
Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation
88(16)
Kurt Dietrich
Trusted Network
SocialClouds: Concept, Security Architecture and Some Mechanisms
104(25)
Shouhuai Xu
Moti Yung
Privacy Enhanced Trusted Network Connect
129(17)
Ingo Bente
Joerg Vieweg
Josef von Helden
Research on Multistage Interconnection Architecture and Collision Detection Model
146(10)
Mengmeng Li
Yong Zhao
Virtualization
Trusted Virtual Domains - Design, Implementation and Lessons Learned
156(24)
Luigi Catuogno
Alexandra Dmitrienko
Konrad Eriksson
Dirk Kuhlmann
Gianluca Ramunno
Ahmad-Reza Sadeghi
Steffen Schulz
Matthias Schunter
Marcel Winandy
Jing Zhan
Trusted Integrity Measurement and Reporting for Virtualized Platforms
180(17)
Serdar Cabuk
Liqun Chen
David Plaquin
Mark Ryan
Applications
A Feather-Weight Application Isolation Model
197(15)
Jianhua Liao
Yong Zhao
Changxiang Shen
Exploring Trust of Mobile Applications Based on User Behaviors
212(15)
Zheng Yan
Yan Dong
Valtteri Niemi
Guoliang Yu
Trusted Firmware Services Based on TPM
227(9)
Zhenlong Du
Xiaoli Li
Kangkang Shen
Supporting Technology
Improved Cryptanalysis of the FOX Block Cipher
236(14)
Zhongming Wu
Yiyuan Luo
Xuejia Lai
Bo Zhu
Bitwise Higher Order Differential Cryptanalysis
250(13)
Bo Zhu
Kefei Chen
Xuejia Lai
Author Index 263