Limit search to available items
Book Cover
E-book
Author TRUST (Conference) (6th : 2013 : London, England)

Title Trust and trustworthy computing : 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings / Michael Huth [and others] (eds.)
Published Berlin ; New York : Springer, ©2013

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7904
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7904.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Technical Strand. KISS: "Key It Simple and Secure" Corporate Key Management / Zongwei Zhou [and others] -- Guardian: Hypervisor as Security Foothold for Personal Computers / Yueqiang Cheng, Xuhua Ding -- Improving Trusted Tickets with State-Bound Keys / Jan Nordholz, Ronald Aigner, Paul England -- Group Signatures on Mobile Devices: Practical Experiences / Klaus Potzmader [and others] -- Limiting Data Exposure in Monitoring Multi-domain Policy Conformance / Mirko Montanari [and others] -- Towards Trustworthy Network Measurements / Ghassan O. Karame -- Stochastic Model of a Metastability-Based True Random Number Generator / Molka Ben-Romdhane, Tarik Graba, Jean-Luc Danger -- Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform / Martin Pirker, Johannes Winter -- Tapping and Tripping with NFC / Sandeep Tamrakar, Jan-Erik Ekberg -- TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications / Wei Feng [and others] -- TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas / Chris Burnett [and others] -- First-Class Labels: Using Information Flow to Debug Security Holes / Eric Hennigan [and others] -- A Framework for Evaluating Mobile App Repackaging Detection Algorithms / Heqing Huang [and others] -- Towards Precise and Efficient Information Flow Control in Web Browsers / Christoph Kerschbaumer [and others]
Socio-Economic Strand. Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook / Ann Light, Lizzie Coles-Kemp -- Contextualized Web Warnings, and How They Cause Distrust / Steffen Bartsch [and others] -- All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things / Marc Busch [and others] -- Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach / Gabrielle Anderson, Matthew Collinson, David Pym -- "Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure / Miguel Malheiros, Sören Preibusch, M. Angela Sasse -- Poster Abstracts. Formal Evaluation of Persona Trustworthiness with EUSTACE / Shamal Faily [and others] -- Identity Implies Trust in Distributed Systems -- A Novel Approach / Lyzgeo Merin Koshy [and others] -- Non-intrusive and Transparent Authentication on Smart Phones / Nicholas Micallef [and others] -- Quaestio-it.com: From Debates Towards Trustworthy Answers / Valentinos Evripidou, Francesca Toni -- Towards Verifiable Trust Management for Software Execution / Michael Huth, Jim Huan-Pu Kuo
Summary This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs
Analysis Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Information Systems Applications (incl. Internet)
computerwetenschappen
computer sciences
informatiesystemen
internet
algoritmen
algorithms
computeranalyse
computer analysis
computers
samenleving
society
gegevensbeheer
data management
computernetwerken
computer networks
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes International conference proceedings
Includes author index
Bibliography Includes bibliographical references and index
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks.
Computer security.
Computer Communication Networks
Computer Security
Computer networks
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Huth, Michael, 1962-
ISBN 9783642389085
3642389082
3642389074
9783642389078
Other Titles TRUST 2013