Amazon cover image
Image from Amazon.com

Trusted computing, challenges and applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008 : Proceedings / Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 4968. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer-Verlag, ©2008.Description: 1 online resource (x, 190 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540689799
  • 3540689796
  • 9783540689782
  • 3540689788
Subject(s): Genre/Form: Additional physical formats: Print version:: Trusted computing, challenges and applications.DDC classification:
  • 004 22
LOC classification:
  • QA76.9.A25 I556 2008eb
Online resources:
Contents:
TRUST 2008 -- Practical Techniques for Operating System Attestation -- TOCTOU, Traps, and Trusted Computing -- A Software-Based Trusted Platform Module Emulator -- Towards Trust Services for Language-Based Virtual Machines for Grid Computing -- Embedded Trusted Computing with Authenticated Non-volatile Memory -- The Zurich Trusted Information Channel -- An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks -- A Model for New Zealand's Identity Verification Service -- Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI -- Para-Virtualized TPM Sharing -- Slicing for Security of Code -- Trusted Computing Serving an Anonymity Service -- Combining Biometric Authentication with Privacy-Enhancing Technologies -- A New Direct Anonymous Attestation Scheme from Bilinear Maps -- On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA).
Summary: Annotation This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, held in Villach, Austria, in March 2008. The 13 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 43 submissions. The papers cover the core issues of trust in IT systems and present recent leading edge developments in the field of trusted infrastructure and computing to foster the international knowledge exchange necessary to catch up with the latest trends in science and technology developments.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and index.

Print version record.

Annotation This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, held in Villach, Austria, in March 2008. The 13 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 43 submissions. The papers cover the core issues of trust in IT systems and present recent leading edge developments in the field of trusted infrastructure and computing to foster the international knowledge exchange necessary to catch up with the latest trends in science and technology developments.

TRUST 2008 -- Practical Techniques for Operating System Attestation -- TOCTOU, Traps, and Trusted Computing -- A Software-Based Trusted Platform Module Emulator -- Towards Trust Services for Language-Based Virtual Machines for Grid Computing -- Embedded Trusted Computing with Authenticated Non-volatile Memory -- The Zurich Trusted Information Channel -- An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks -- A Model for New Zealand's Identity Verification Service -- Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI -- Para-Virtualized TPM Sharing -- Slicing for Security of Code -- Trusted Computing Serving an Anonymity Service -- Combining Biometric Authentication with Privacy-Enhancing Technologies -- A New Direct Anonymous Attestation Scheme from Bilinear Maps -- On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA).

English.

Powered by Koha