𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Lecture Notes in Computer Science] Trusted Systems Volume 6802 || Information Flow Graph: An Approach to Identifying Covert Storage Channels

✍ Scribed by Chen, Liqun; Yung, Moti


Book ID
120477669
Publisher
Springer Berlin Heidelberg
Year
2011
Tongue
German
Weight
259 KB
Category
Article
ISBN
3642252834

No coin nor oath required. For personal study only.

✦ Synopsis


This Book Constitutes The Proceedings Of The International Conference On Trusted Systems, Held In Beijing, China, In December 2010.the 23 Contributed Papers Presented Together With Nine Invited Talks From A Workshop, Titled Asian Lounge On Trust, Security And Privacy Were Carefully Selected From 66 Submissions. The Papers Are Organized In Seven Topical Sections On Implentation Technology, Security Analysis, Cryptographic Aspects, Mobile Trusted Systems, Hardware Security, Attestation, And Software Protection.


πŸ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Natu
✍ Kedad, Zoubida; Lammari, Nadira; MΓ©tais, Elisabeth; Meziane, Farid; Rezgui, Yaci πŸ“‚ Article πŸ“… 2007 πŸ› Springer Berlin Heidelberg 🌐 German βš– 321 KB

This Book Constitutes The Refereed Proceedings Of The 12th International Conference On Applications Of Natural Language To Information Systems, Nldb 2007, Held In Paris, France In June 2007. It Covers Natural Language For Database Query Processing, Email Management, Semantic Annotation, Text Cluster

[Lecture Notes in Computer Science] Next
✍ Etzion, Opher; Kuflik, Tsvi; Motro, Amihai πŸ“‚ Article πŸ“… 2006 πŸ› Springer Berlin Heidelberg 🌐 English βš– 211 KB

This book constitutes the refereed proceedings of the 6th International Workshop on Next Generation Information Technologies and Systems, NGITS 2006, held in Kibbutz Shefayim, Israel, July 2006. The book presents 28 revised full papers and four revised short papers together with three invited papers