Limit search to available items
158 results found. Sorted by relevance | date | title .
Book Cover
E-book
Author TRUST (Conference) (6th : 2013 : London, England)

Title Trust and trustworthy computing : 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings / Michael Huth [and others] (eds.)
Published Berlin ; New York : Springer, [2013]
©2013
Online access available from:
Springer eBooks    View Resource Record  

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7904
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7904
LNCS sublibrary. SL 4, Security and cryptology.
Contents Technical Strand. KISS: "Key It Simple and Secure" Corporate Key Management / Zongwei Zhou [and others] -- Guardian: Hypervisor as Security Foothold for Personal Computers / Yueqiang Cheng, Xuhua Ding -- Improving Trusted Tickets with State-Bound Keys / Jan Nordholz, Ronald Aigner, Paul England -- Group Signatures on Mobile Devices: Practical Experiences / Klaus Potzmader [and others] -- Limiting Data Exposure in Monitoring Multi-domain Policy Conformance / Mirko Montanari [and others] -- Towards Trustworthy Network Measurements / Ghassan O. Karame -- Stochastic Model of a Metastability-Based True Random Number Generator / Molka Ben-Romdhane, Tarik Graba, Jean-Luc Danger -- Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform / Martin Pirker, Johannes Winter -- Tapping and Tripping with NFC / Sandeep Tamrakar, Jan-Erik Ekberg -- TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications / Wei Feng [and others] -- TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas / Chris Burnett [and others] -- First-Class Labels: Using Information Flow to Debug Security Holes / Eric Hennigan [and others] -- A Framework for Evaluating Mobile App Repackaging Detection Algorithms / Heqing Huang [and others] -- Towards Precise and Efficient Information Flow Control in Web Browsers / Christoph Kerschbaumer [and others]
Socio-Economic Strand. Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook / Ann Light, Lizzie Coles-Kemp -- Contextualized Web Warnings, and How They Cause Distrust / Steffen Bartsch [and others] -- All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things / Marc Busch [and others] -- Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach / Gabrielle Anderson, Matthew Collinson, David Pym -- "Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure / Miguel Malheiros, Sören Preibusch, M. Angela Sasse -- Poster Abstracts. Formal Evaluation of Persona Trustworthiness with EUSTACE / Shamal Faily [and others] -- Identity Implies Trust in Distributed Systems -- A Novel Approach / Lyzgeo Merin Koshy [and others] -- Non-intrusive and Transparent Authentication on Smart Phones / Nicholas Micallef [and others] -- Quaestio-it.com: From Debates Towards Trustworthy Answers / Valentinos Evripidou, Francesca Toni -- Towards Verifiable Trust Management for Software Execution / Michael Huth, Jim Huan-Pu Kuo
Summary This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs
Analysis Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Information Systems Applications (incl. Internet)
Notes International conference proceedings
Includes author index
Bibliography Includes bibliographical references and index
Subject Computer security -- Congresses.
Data encryption (Computer science) -- Congresses.
Computer networks -- Security measures -- Congresses.
Computer Communication Networks.
Computer Security.
Genre/Form Conference papers and proceedings.
Congress.
Conference papers and proceedings.
Form Electronic book
Author Huth, Michael, 1962-
ISBN 9783642389085 (electronic bk.)
3642389082 (electronic bk.)
3642389074 (print)
9783642389078 (print)
Other Titles TRUST 2013