TY - BOOK AU - Huth,Michael ED - TRUST (Conference) TI - Trust and trustworthy computing: 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings T2 - Lecture notes in computer science, SN - 9783642389085 AV - QA76.9.A25 .T78 2013 U1 - 005.8 23 PY - 2013/// CY - Berlin, New York PB - Springer KW - Computer security KW - Congresses KW - Data encryption (Computer science) KW - Computer networks KW - Security measures KW - Computer Communication Networks KW - Computer Security KW - Sécurité informatique KW - Congrès KW - Chiffrement (Informatique) KW - Réseaux d'ordinateurs KW - Sécurité KW - Mesures KW - fast KW - Computer science KW - Computer software KW - Information Systems KW - Management of Computing and Information Systems KW - Algorithm Analysis and Problem Complexity KW - Computers and Society KW - Information Systems Applications (incl. Internet) KW - computerwetenschappen KW - computer sciences KW - informatiesystemen KW - internet KW - algoritmen KW - algorithms KW - computeranalyse KW - computer analysis KW - computers KW - samenleving KW - society KW - gegevensbeheer KW - data management KW - computernetwerken KW - computer networks KW - Information and Communication Technology (General) KW - Informatie- en communicatietechnologie (algemeen) KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - International conference proceedings; Includes author index; Includes bibliographical references and index; Technical Strand; KISS: "Key It Simple and Secure" Corporate Key Management; Zongwei Zhou [and others] --; Guardian: Hypervisor as Security Foothold for Personal Computers; Yueqiang Cheng, Xuhua Ding --; Improving Trusted Tickets with State-Bound Keys; Jan Nordholz, Ronald Aigner, Paul England --; Group Signatures on Mobile Devices: Practical Experiences; Klaus Potzmader [and others] --; Limiting Data Exposure in Monitoring Multi-domain Policy Conformance; Mirko Montanari [and others] --; Towards Trustworthy Network Measurements; Ghassan O. Karame --; Stochastic Model of a Metastability-Based True Random Number Generator; Molka Ben-Romdhane, Tarik Graba, Jean-Luc Danger --; Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform; Martin Pirker, Johannes Winter --; Tapping and Tripping with NFC; Sandeep Tamrakar, Jan-Erik Ekberg --; TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications; Wei Feng [and others] --; TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas; Chris Burnett [and others] --; First-Class Labels: Using Information Flow to Debug Security Holes; Eric Hennigan [and others] --; A Framework for Evaluating Mobile App Repackaging Detection Algorithms; Heqing Huang [and others] --; Towards Precise and Efficient Information Flow Control in Web Browsers; Christoph Kerschbaumer [and others]; Socio-Economic Strand; Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook; Ann Light, Lizzie Coles-Kemp --; Contextualized Web Warnings, and How They Cause Distrust; Steffen Bartsch [and others] --; All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things; Marc Busch [and others] --; Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach; Gabrielle Anderson, Matthew Collinson, David Pym --; "Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure; Miguel Malheiros, Sören Preibusch, M. Angela Sasse --; Poster Abstracts; Formal Evaluation of Persona Trustworthiness with EUSTACE; Shamal Faily [and others] --; Identity Implies Trust in Distributed Systems -- A Novel Approach; Lyzgeo Merin Koshy [and others] --; Non-intrusive and Transparent Authentication on Smart Phones; Nicholas Micallef [and others] --; Quaestio-it.com: From Debates Towards Trustworthy Answers; Valentinos Evripidou, Francesca Toni --; Towards Verifiable Trust Management for Software Execution; Michael Huth, Jim Huan-Pu Kuo N2 - This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs UR - https://link.springer.com/10.1007/978-3-642-38908-5 ER -