000 04744nam a22006855i 4500
001 978-3-540-68979-9
003 DE-He213
005 20240730192503.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 _a9783540689799
_9978-3-540-68979-9
024 7 _a10.1007/978-3-540-68979-9
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aTrusted Computing - Challenges and Applications
_h[electronic resource] :
_bFirst International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings /
_cedited by Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch.
250 _a1st ed. 2008.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2008.
300 _aX, 191 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4968
505 0 _aTRUST 2008 -- Practical Techniques for Operating System Attestation -- TOCTOU, Traps, and Trusted Computing -- A Software-Based Trusted Platform Module Emulator -- Towards Trust Services for Language-Based Virtual Machines for Grid Computing -- Embedded Trusted Computing with Authenticated Non-volatile Memory -- The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks -- A Model for New Zealand's Identity Verification Service -- Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI -- Para-Virtualized TPM Sharing -- Slicing for Security of Code -- Trusted Computing Serving an Anonymity Service -- Combining Biometric Authentication with Privacy-Enhancing Technologies -- A New Direct Anonymous Attestation Scheme from Bilinear Maps -- On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA).
520 _aThis volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. The aim of the conference was to create a joint scienti?c and networking platform covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international research groups and projects in closely related ?elds. The organizers received 43 submissions from 17 countries. Each of the s- mittedpaperswasreviewedbythreereviewers.Basedonthesereviews13papers were selected as suitable for the conference and the authors were asked to p- sent their work. Further, six renowned speakers from academia, industry and the European Commission were invited for keynotes. The accepted papers are published in this volume together with one paper from Paul England, one of the invited speakers at TRUST 2008. TheconferencewassupportedbytheEuropeanCommissionviatheOpen-TC project (FP6 IST-027635), by the Austrian Research Promotion Agency (FFG) and by the city of Villach.
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 0 _aSoftware engineering.
_94138
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aApplication software.
_9150137
650 0 _aUser interfaces (Computer systems).
_911681
650 0 _aHuman-computer interaction.
_96196
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_9150138
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer and Information Systems Applications.
_9150139
650 2 4 _aUser Interfaces and Human Computer Interaction.
_931632
700 1 _aLipp, Peter.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9150140
700 1 _aSadeghi, Ahmad-Reza.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9150141
700 1 _aKoch, Klaus-Michael.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9150142
710 2 _aSpringerLink (Online service)
_9150143
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540689782
776 0 8 _iPrinted edition:
_z9783540864714
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4968
_9150144
856 4 0 _uhttps://doi.org/10.1007/978-3-540-68979-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c94277
_d94277