Trusted computing, challenges and applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008 : Proceedings / Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 4968. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer-Verlag, ©2008.Description: 1 online resource (x, 190 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783540689799
- 3540689796
- 9783540689782
- 3540689788
- Computer security -- Congresses
- Data encryption (Computer science) -- Congresses
- Public key infrastructure (Computer security) -- Congresses
- Sécurité informatique -- Congrès
- Chiffrement (Informatique) -- Congrès
- Infrastructure à clé publique (Sécurité informatique) -- Congrès
- Informatique
- Computer security
- Data encryption (Computer science)
- Public key infrastructure (Computer security)
- 004 22
- QA76.9.A25 I556 2008eb
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes bibliographical references and index.
Print version record.
Annotation This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, held in Villach, Austria, in March 2008. The 13 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 43 submissions. The papers cover the core issues of trust in IT systems and present recent leading edge developments in the field of trusted infrastructure and computing to foster the international knowledge exchange necessary to catch up with the latest trends in science and technology developments.
TRUST 2008 -- Practical Techniques for Operating System Attestation -- TOCTOU, Traps, and Trusted Computing -- A Software-Based Trusted Platform Module Emulator -- Towards Trust Services for Language-Based Virtual Machines for Grid Computing -- Embedded Trusted Computing with Authenticated Non-volatile Memory -- The Zurich Trusted Information Channel -- An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks -- A Model for New Zealand's Identity Verification Service -- Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI -- Para-Virtualized TPM Sharing -- Slicing for Security of Code -- Trusted Computing Serving an Anonymity Service -- Combining Biometric Authentication with Privacy-Enhancing Technologies -- A New Direct Anonymous Attestation Scheme from Bilinear Maps -- On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA).
English.