Trust and trustworthy computing : 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings /
Trust and trustworthy computing : 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings /
TRUST 2013
Michael Huth [and others] (eds.).
- Berlin ; New York : Springer, ©2013.
- 1 online resource
- Lecture notes in computer science, 7904 0302-9743 ; LNCS sublibrary. SL 4, Security and cryptology .
- Lecture notes in computer science ; 7904. LNCS sublibrary. SL 4, Security and cryptology. .
International conference proceedings. Includes author index.
Includes bibliographical references and index.
Technical Strand. KISS: "Key It Simple and Secure" Corporate Key Management / Guardian: Hypervisor as Security Foothold for Personal Computers / Improving Trusted Tickets with State-Bound Keys / Group Signatures on Mobile Devices: Practical Experiences / Limiting Data Exposure in Monitoring Multi-domain Policy Conformance / Towards Trustworthy Network Measurements / Stochastic Model of a Metastability-Based True Random Number Generator / Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform / Tapping and Tripping with NFC / TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications / TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas / First-Class Labels: Using Information Flow to Debug Security Holes / A Framework for Evaluating Mobile App Repackaging Detection Algorithms / Towards Precise and Efficient Information Flow Control in Web Browsers / Zongwei Zhou [and others] -- Yueqiang Cheng, Xuhua Ding -- Jan Nordholz, Ronald Aigner, Paul England -- Klaus Potzmader [and others] -- Mirko Montanari [and others] -- Ghassan O. Karame -- Molka Ben-Romdhane, Tarik Graba, Jean-Luc Danger -- Martin Pirker, Johannes Winter -- Sandeep Tamrakar, Jan-Erik Ekberg -- Wei Feng [and others] -- Chris Burnett [and others] -- Eric Hennigan [and others] -- Heqing Huang [and others] -- Christoph Kerschbaumer [and others]. Socio-Economic Strand. Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook / Contextualized Web Warnings, and How They Cause Distrust / All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things / Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach / "Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure / Poster Abstracts. Formal Evaluation of Persona Trustworthiness with EUSTACE / Identity Implies Trust in Distributed Systems -- A Novel Approach / Non-intrusive and Transparent Authentication on Smart Phones / Quaestio-it.com: From Debates Towards Trustworthy Answers / Towards Verifiable Trust Management for Software Execution / Ann Light, Lizzie Coles-Kemp -- Steffen Bartsch [and others] -- Marc Busch [and others] -- Gabrielle Anderson, Matthew Collinson, David Pym -- Miguel Malheiros, Sören Preibusch, M. Angela Sasse -- Shamal Faily [and others] -- Lyzgeo Merin Koshy [and others] -- Nicholas Micallef [and others] -- Valentinos Evripidou, Francesca Toni -- Michael Huth, Jim Huan-Pu Kuo.
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.
9783642389085 3642389082 3642389074 9783642389078
10.1007/978-3-642-38908-5 doi
Springer
016437035 Uk
Computer security--Congresses.
Data encryption (Computer science)--Congresses.
Computer networks--Security measures--Congresses.
Computer networks.
Computer security.
Computer Communication Networks
Computer Security
Sécurité informatique--Congrès.
Chiffrement (Informatique)--Congrès.
Réseaux d'ordinateurs--Sécurité--Mesures--Congrès.
Réseaux d'ordinateurs.
Sécurité informatique.
Computer networks
Computer networks--Security measures
Computer security
Data encryption (Computer science)
Computer science. Computer Communication Networks. Data encryption (Computer science) Computer software. Information Systems. Management of Computing and Information Systems. Algorithm Analysis and Problem Complexity. Computers and Society. Information Systems Applications (incl. Internet) computerwetenschappen computer sciences informatiesystemen internet algoritmen algorithms computeranalyse computer analysis computers samenleving society gegevensbeheer data management computernetwerken computer networks Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen)
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
QA76.9.A25 / .T78 2013
005.8
QA 76.9.A25
International conference proceedings. Includes author index.
Includes bibliographical references and index.
Technical Strand. KISS: "Key It Simple and Secure" Corporate Key Management / Guardian: Hypervisor as Security Foothold for Personal Computers / Improving Trusted Tickets with State-Bound Keys / Group Signatures on Mobile Devices: Practical Experiences / Limiting Data Exposure in Monitoring Multi-domain Policy Conformance / Towards Trustworthy Network Measurements / Stochastic Model of a Metastability-Based True Random Number Generator / Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform / Tapping and Tripping with NFC / TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications / TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas / First-Class Labels: Using Information Flow to Debug Security Holes / A Framework for Evaluating Mobile App Repackaging Detection Algorithms / Towards Precise and Efficient Information Flow Control in Web Browsers / Zongwei Zhou [and others] -- Yueqiang Cheng, Xuhua Ding -- Jan Nordholz, Ronald Aigner, Paul England -- Klaus Potzmader [and others] -- Mirko Montanari [and others] -- Ghassan O. Karame -- Molka Ben-Romdhane, Tarik Graba, Jean-Luc Danger -- Martin Pirker, Johannes Winter -- Sandeep Tamrakar, Jan-Erik Ekberg -- Wei Feng [and others] -- Chris Burnett [and others] -- Eric Hennigan [and others] -- Heqing Huang [and others] -- Christoph Kerschbaumer [and others]. Socio-Economic Strand. Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook / Contextualized Web Warnings, and How They Cause Distrust / All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things / Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach / "Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure / Poster Abstracts. Formal Evaluation of Persona Trustworthiness with EUSTACE / Identity Implies Trust in Distributed Systems -- A Novel Approach / Non-intrusive and Transparent Authentication on Smart Phones / Quaestio-it.com: From Debates Towards Trustworthy Answers / Towards Verifiable Trust Management for Software Execution / Ann Light, Lizzie Coles-Kemp -- Steffen Bartsch [and others] -- Marc Busch [and others] -- Gabrielle Anderson, Matthew Collinson, David Pym -- Miguel Malheiros, Sören Preibusch, M. Angela Sasse -- Shamal Faily [and others] -- Lyzgeo Merin Koshy [and others] -- Nicholas Micallef [and others] -- Valentinos Evripidou, Francesca Toni -- Michael Huth, Jim Huan-Pu Kuo.
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.
9783642389085 3642389082 3642389074 9783642389078
10.1007/978-3-642-38908-5 doi
Springer
016437035 Uk
Computer security--Congresses.
Data encryption (Computer science)--Congresses.
Computer networks--Security measures--Congresses.
Computer networks.
Computer security.
Computer Communication Networks
Computer Security
Sécurité informatique--Congrès.
Chiffrement (Informatique)--Congrès.
Réseaux d'ordinateurs--Sécurité--Mesures--Congrès.
Réseaux d'ordinateurs.
Sécurité informatique.
Computer networks
Computer networks--Security measures
Computer security
Data encryption (Computer science)
Computer science. Computer Communication Networks. Data encryption (Computer science) Computer software. Information Systems. Management of Computing and Information Systems. Algorithm Analysis and Problem Complexity. Computers and Society. Information Systems Applications (incl. Internet) computerwetenschappen computer sciences informatiesystemen internet algoritmen algorithms computeranalyse computer analysis computers samenleving society gegevensbeheer data management computernetwerken computer networks Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen)
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
QA76.9.A25 / .T78 2013
005.8
QA 76.9.A25