𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Trusted Computing - Challenges and Applications: First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

✍ Scribed by Paul England (auth.), Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2008
Tongue
English
Leaves
200
Series
Lecture Notes in Computer Science 4968 Security and Cryptology
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. The aim of the conference was to create a joint scienti?c and networking platform covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international research groups and projects in closely related ?elds. The organizers received 43 submissions from 17 countries. Each of the s- mittedpaperswasreviewedbythreereviewers.Basedonthesereviews13papers were selected as suitable for the conference and the authors were asked to p- sent their work. Further, six renowned speakers from academia, industry and the European Commission were invited for keynotes. The accepted papers are published in this volume together with one paper from Paul England, one of the invited speakers at TRUST 2008. TheconferencewassupportedbytheEuropeanCommissionviatheOpen-TC project (FP6 IST-027635), by the Austrian Research Promotion Agency (FFG) and by the city of Villach.

✦ Table of Contents


Front Matter....Pages -
Practical Techniques for Operating System Attestation....Pages 1-13
TOCTOU, Traps, and Trusted Computing....Pages 14-32
A Software-Based Trusted Platform Module Emulator....Pages 33-47
Towards Trust Services for Language-Based Virtual Machines for Grid Computing....Pages 48-59
Embedded Trusted Computing with Authenticated Non-volatile Memory....Pages 60-74
The Zurich Trusted Information Channel – An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks....Pages 75-91
A Model for New Zealand’s Identity Verification Service....Pages 92-106
Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI....Pages 107-118
Para-Virtualized TPM Sharing....Pages 119-132
Slicing for Security of Code....Pages 133-142
Trusted Computing Serving an Anonymity Service....Pages 143-154
Combining Biometric Authentication with Privacy-Enhancing Technologies....Pages 155-165
A New Direct Anonymous Attestation Scheme from Bilinear Maps....Pages 166-178
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA)....Pages 179-190
Back Matter....Pages -

✦ Subjects


Systems and Data Security; Computer Communication Networks; Software Engineering; Data Encryption; Information Systems Applications (incl.Internet); User Interfaces and Human Computer Interaction


πŸ“œ SIMILAR VOLUMES


Trust Management: Proceedings of IFIPTM
✍ Sandro Etalle, Stephen Marsh πŸ“‚ Library πŸ“… 2007 πŸ› Springer 🌐 English

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer application

Future of Trust in Computing: Proceeding
✍ Avd. JosΓ© Aguado (auth.), David Gawrock, Helmut Reimer, Ahmad-Reza Sadeghi, Clai πŸ“‚ Library πŸ“… 2009 πŸ› Vieweg+Teubner Verlag 🌐 English

<p>The concept of trust is related to many aspects of our daily lives, and different stakeholders use the term β€œtrust” in various contexts. Trust is crucial in today’s information societies for ensuring success of digital economies in all countries and regions. This book contains papers that were pr

Trust Management: First International Co
✍ Michael Kinateder, Kurt Rothermel (auth.), Paddy Nixon, Sotirios Terzis (eds.) πŸ“‚ Library πŸ“… 2003 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>iTrust is an Information Society Technologies (IST) working group, which started on 1st of August, 2002. The working group is being funded as a concerted action/ thematic network by the Future and Emerging Technologies (FET) unit of the IST program. The aim of iTrust is to provide a forum for cro

Trust Management: Second International C
✍ Ian Walden (auth.), Christian Jensen, Stefan Poslad, Theo Dimitrakos (eds.) πŸ“‚ Library πŸ“… 2004 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<P>This book constitutes the refereed proceedings of the Second International Conference on Trust Management, iTrust 2004, held in Oxford, UK, in March/April 2004.</P><P>The 21 revised full papers and 6 revised short papers presented together with 3 invited contributions were carefully reviewed and