Description |
1 online resource |
Series |
Lecture notes in computer science, 0302-9743 ; 7904 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7904.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Technical Strand. KISS: "Key It Simple and Secure" Corporate Key Management / Zongwei Zhou [and others] -- Guardian: Hypervisor as Security Foothold for Personal Computers / Yueqiang Cheng, Xuhua Ding -- Improving Trusted Tickets with State-Bound Keys / Jan Nordholz, Ronald Aigner, Paul England -- Group Signatures on Mobile Devices: Practical Experiences / Klaus Potzmader [and others] -- Limiting Data Exposure in Monitoring Multi-domain Policy Conformance / Mirko Montanari [and others] -- Towards Trustworthy Network Measurements / Ghassan O. Karame -- Stochastic Model of a Metastability-Based True Random Number Generator / Molka Ben-Romdhane, Tarik Graba, Jean-Luc Danger -- Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform / Martin Pirker, Johannes Winter -- Tapping and Tripping with NFC / Sandeep Tamrakar, Jan-Erik Ekberg -- TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications / Wei Feng [and others] -- TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas / Chris Burnett [and others] -- First-Class Labels: Using Information Flow to Debug Security Holes / Eric Hennigan [and others] -- A Framework for Evaluating Mobile App Repackaging Detection Algorithms / Heqing Huang [and others] -- Towards Precise and Efficient Information Flow Control in Web Browsers / Christoph Kerschbaumer [and others] |
|
Socio-Economic Strand. Granddaughter Beware! An Intergenerational Case Study of Managing Trust Issues in the Use of Facebook / Ann Light, Lizzie Coles-Kemp -- Contextualized Web Warnings, and How They Cause Distrust / Steffen Bartsch [and others] -- All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things / Marc Busch [and others] -- Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach / Gabrielle Anderson, Matthew Collinson, David Pym -- "Fairly Truthful": The Impact of Perceived Effort, Fairness, Relevance, and Sensitivity on Personal Data Disclosure / Miguel Malheiros, Sören Preibusch, M. Angela Sasse -- Poster Abstracts. Formal Evaluation of Persona Trustworthiness with EUSTACE / Shamal Faily [and others] -- Identity Implies Trust in Distributed Systems -- A Novel Approach / Lyzgeo Merin Koshy [and others] -- Non-intrusive and Transparent Authentication on Smart Phones / Nicholas Micallef [and others] -- Quaestio-it.com: From Debates Towards Trustworthy Answers / Valentinos Evripidou, Francesca Toni -- Towards Verifiable Trust Management for Software Execution / Michael Huth, Jim Huan-Pu Kuo |
Summary |
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data encryption (Computer science) |
|
Computer software |
|
Information Systems |
|
Management of Computing and Information Systems |
|
Algorithm Analysis and Problem Complexity |
|
Computers and Society |
|
Information Systems Applications (incl. Internet) |
|
computerwetenschappen |
|
computer sciences |
|
informatiesystemen |
|
internet |
|
algoritmen |
|
algorithms |
|
computeranalyse |
|
computer analysis |
|
computers |
|
samenleving |
|
society |
|
gegevensbeheer |
|
data management |
|
computernetwerken |
|
computer networks |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Notes |
International conference proceedings |
|
Includes author index |
Bibliography |
Includes bibliographical references and index |
Subject |
Computer security -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer networks.
|
|
Computer security.
|
|
Computer Communication Networks
|
|
Computer Security
|
|
Computer networks
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Huth, Michael, 1962-
|
ISBN |
9783642389085 |
|
3642389082 |
|
3642389074 |
|
9783642389078 |
|