000 05128nam a22006375i 4500
001 978-3-642-14597-1
003 DE-He213
005 20240730185346.0
007 cr nn 008mamaa
008 100709s2010 gw | s |||| 0|eng d
020 _a9783642145971
_9978-3-642-14597-1
024 7 _a10.1007/978-3-642-14597-1
_2doi
050 4 _aQA75.5-76.95
072 7 _aUYA
_2bicssc
072 7 _aCOM014000
_2bisacsh
072 7 _aUYA
_2thema
082 0 4 _a004.0151
_223
245 1 0 _aTrusted Systems
_h[electronic resource] :
_bFirst International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings /
_cedited by Liqun Chen, Moti Yung.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aXIV, 263 p. 64 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6163
505 0 _aInvited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage -- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing -- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks -- Attestation -- Remote Attestation on Function Execution (Work-in-Progress) -- Scalable Remote Attestation with Privacy Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network -- SocialClouds: Concept, Security Architecture and Some Mechanisms -- Privacy Enhanced Trusted Network Connect -- Research on Multistage Interconnection Architecture and Collision Detection Model -- Virtualization -- Trusted Virtual Domains - Design, Implementation and Lessons Learned -- Trusted Integrity Measurement and Reporting for Virtualized Platforms -- Applications -- A Feather-Weight Application Isolation Model -- Exploring Trust of Mobile Applications Based on User Behaviors -- Trusted Firmware Services Based on TPM -- Supporting Technology -- Improved Cryptanalysis of the FOX Block Cipher -- Bitwise Higher Order Differential Cryptanalysis.
520 _aThis volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.
650 0 _aComputer science.
_99832
650 0 _aComputer networks .
_931572
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aElectronic data processing
_xManagement.
_9138964
650 0 _aAlgorithms.
_93390
650 0 _aComputers and civilization.
_921733
650 1 4 _aTheory of Computation.
_9138965
650 2 4 _aComputer Communication Networks.
_9138966
650 2 4 _aCryptology.
_931769
650 2 4 _aIT Operations.
_931703
650 2 4 _aAlgorithms.
_93390
650 2 4 _aComputers and Society.
_931668
700 1 _aChen, Liqun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138967
700 1 _aYung, Moti.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138968
710 2 _aSpringerLink (Online service)
_9138969
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642145964
776 0 8 _iPrinted edition:
_z9783642145988
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6163
_9138970
856 4 0 _uhttps://doi.org/10.1007/978-3-642-14597-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c92779
_d92779