Sold out

Trusted Computing - Challenges and Applications - First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings

English · Paperback / Softback

Description

Read more

This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. The aim of the conference was to create a joint scienti?c and networking platform covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international research groups and projects in closely related ?elds. The organizers received 43 submissions from 17 countries. Each of the s- mittedpaperswasreviewedbythreereviewers.Basedonthesereviews13papers were selected as suitable for the conference and the authors were asked to p- sent their work. Further, six renowned speakers from academia, industry and the European Commission were invited for keynotes. The accepted papers are published in this volume together with one paper from Paul England, one of the invited speakers at TRUST 2008. TheconferencewassupportedbytheEuropeanCommissionviatheOpen-TC project (FP6 IST-027635), by the Austrian Research Promotion Agency (FFG) and by the city of Villach.

List of contents

TRUST 2008.- Practical Techniques for Operating System Attestation.- TOCTOU, Traps, and Trusted Computing.- A Software-Based Trusted Platform Module Emulator.- Towards Trust Services for Language-Based Virtual Machines for Grid Computing.- Embedded Trusted Computing with Authenticated Non-volatile Memory.- The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks.- A Model for New Zealand's Identity Verification Service.- Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI.- Para-Virtualized TPM Sharing.- Slicing for Security of Code.- Trusted Computing Serving an Anonymity Service.- Combining Biometric Authentication with Privacy-Enhancing Technologies.- A New Direct Anonymous Attestation Scheme from Bilinear Maps.- On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA).

About the author

Peter Lipp ist Projektleiter Data Mining bei AZ Direct GmbH, Gütersloh.

Product details

Assisted by Klaus-Michael Koch (Editor), Peter Lipp (Editor), Ahmad-Reza Sadeghi (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.01.2008
 
EAN 9783540689782
ISBN 978-3-540-68978-2
No. of pages 191
Dimensions 154 mm x 237 mm x 13 mm
Series Lecture Notes in Computer Science
Security and Cryptology
Lecture Notes in Computer Science / Security and Cryptology
Lecture Notes in Computer Science
Security and Cryptology
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.