Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings /

This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. The aim of the conference was to create a joint scienti?c and networking platform covering the core issues of tru...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Lipp, Peter (Επιμελητής έκδοσης), Sadeghi, Ahmad-Reza (Επιμελητής έκδοσης), Koch, Klaus-Michael (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008.
Σειρά:Lecture Notes in Computer Science, 4968
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04212nam a22005895i 4500
001 978-3-540-68979-9
003 DE-He213
005 20151204160745.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 |a 9783540689799  |9 978-3-540-68979-9 
024 7 |a 10.1007/978-3-540-68979-9  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Trusted Computing - Challenges and Applications  |h [electronic resource] :  |b First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings /  |c edited by Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2008. 
300 |a X, 191 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 4968 
505 0 |a TRUST 2008 -- Practical Techniques for Operating System Attestation -- TOCTOU, Traps, and Trusted Computing -- A Software-Based Trusted Platform Module Emulator -- Towards Trust Services for Language-Based Virtual Machines for Grid Computing -- Embedded Trusted Computing with Authenticated Non-volatile Memory -- The Zurich Trusted Information Channel – An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks -- A Model for New Zealand’s Identity Verification Service -- Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI -- Para-Virtualized TPM Sharing -- Slicing for Security of Code -- Trusted Computing Serving an Anonymity Service -- Combining Biometric Authentication with Privacy-Enhancing Technologies -- A New Direct Anonymous Attestation Scheme from Bilinear Maps -- On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). 
520 |a This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. The aim of the conference was to create a joint scienti?c and networking platform covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international research groups and projects in closely related ?elds. The organizers received 43 submissions from 17 countries. Each of the s- mittedpaperswasreviewedbythreereviewers.Basedonthesereviews13papers were selected as suitable for the conference and the authors were asked to p- sent their work. Further, six renowned speakers from academia, industry and the European Commission were invited for keynotes. The accepted papers are published in this volume together with one paper from Paul England, one of the invited speakers at TRUST 2008. TheconferencewassupportedbytheEuropeanCommissionviatheOpen-TC project (FP6 IST-027635), by the Austrian Research Promotion Agency (FFG) and by the city of Villach. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Software engineering. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a User interfaces (Computer systems). 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Software Engineering. 
650 2 4 |a Data Encryption. 
650 2 4 |a Information Systems Applications (incl. Internet). 
650 2 4 |a User Interfaces and Human Computer Interaction. 
700 1 |a Lipp, Peter.  |e editor. 
700 1 |a Sadeghi, Ahmad-Reza.  |e editor. 
700 1 |a Koch, Klaus-Michael.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540689782 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 4968 
856 4 0 |u http://dx.doi.org/10.1007/978-3-540-68979-9  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)