Trust and trustworthy computing: 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7344 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XII, 339 S. graph. Darst. |
ISBN: | 3642309208 9783642309205 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040244118 | ||
003 | DE-604 | ||
005 | 20120622 | ||
007 | t| | ||
008 | 120611s2012 gw d||| |||| 10||| eng d | ||
015 | |a 12,N22 |2 dnb | ||
016 | 7 | |a 1022401580 |2 DE-101 | |
020 | |a 3642309208 |9 3-642-30920-8 | ||
020 | |a 9783642309205 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.) |9 978-3-642-30920-5 | ||
024 | 3 | |a 9783642309205 | |
028 | 5 | 2 | |a Best.-Nr.: 86115664 |
035 | |a (OCoLC)796275819 | ||
035 | |a (DE-599)DNB1022401580 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Trust and trustworthy computing |b 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings |c Stefan Katzenbeisser ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XII, 339 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7344 | |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Wien |2 gnd-content | |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Katzenbeisser, Stefan |e Sonstige |4 oth | |
711 | 2 | |a TRUST |n 5 |d 2012 |c Wien |j Sonstige |0 (DE-588)1023232863 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-30921-2 |
830 | 0 | |a Lecture notes in computer science |v 7344 |w (DE-604)BV000000607 |9 7344 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4040587&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025100251&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025100251 |
Datensatz im Suchindex
_version_ | 1820875388827467776 |
---|---|
adam_text |
IMAGE 1
TABLE O F CONTENTS
TECHNICAL S T R A N D
AUTHENTICATED ENCRYPTION PRIMITIVES FOR SIZE-CONSTRAINED TRUSTED
COMPUTING 1
JAN-ERIK EKBERG, ALEXANDRA AFANASYEVA, AND N. ASOKAN
AUDITABLE ENVELOPES: TRACKING ANONYMITY REVOCATION USING TRUSTED
COMPUTING 19
MATT SMART AND EIKE RITTER
LOCKDOWN: TOWARDS A SAFE AND PRACTICAL ARCHITECTURE FOR SECURITY
APPLICATIONS ON COMMODITY PLATFORMS 34
A M I T VASUDEVAN, BRYAN PARNO, NING QU, VIRGIL D. GLIGOR, AND ADRIAN
PERRIG
EXPERIMENTING WITH FAST PRIVATE SET INTERSECTION 55
EMILIANO DE CRISTOFARO AND GENE TSUDIK
RELIABLE DEVICE SHARING MECHANISMS FOR DUAL-OS EMBEDDED TRUSTED
COMPUTING 74
DANIEL SANGORRM, SHINYA HONDA, AND HIROAKI TAKADA,
MODELLING USER-CENTERED-TRUST (UCT) IN SOFTWARE SYSTEMS: INTERPLAY OF
TRUST, AFFECT AND ACCEPTANCE MODEL 92
ZAHID HASAN, ALINA KRISCHKOWSKY, AND MANFRED TSCHELIGI
CLOCKLESS PHYSICAL UNCLONABLE FUNCTIONS 110
JULIAN MURPHY
LIGHTWEIGHT DISTRIBUTED HETEROGENEOUS ATTESTED ANDROID CLOUDS 122 MARTIN
PIRKER, JOHANNES WINTER, AND RONALD TOEGL
CONVERSE PUF-BASED AUTHENTICATION 142
UNAL KOCABA§, ANDREAS PETER, STEFAN KATZENBEISSER, AND AHMAD-REZA
SADEGHI
TRUSTWORTHY EXECUTION ON MOBILE DEVICES: W H A T SECURITY PROPERTIES CAN
MY MOBILE PLATFORM GIVE ME? 159
A M I T VASUDEVAN, EMMANUEL OWUSU, ZONGWEI ZHOU, JAMES NEWSOME, AND
JONATHAN M. MCCUNE
VERIFYING SYSTEM INTEGRITY BY PROXY 179
JOSHUA SCHIFFMAN, HAYAWARDH VIJAYAKUMAR, AND TRENT JAEGER
HTTP://D-NB.INFO/1022401580
IMAGE 2
XII TABLE OF CONTENTS
VIRTUALIZATION BASED PASSWORD PROTECTION AGAINST MALWARE IN UNTRUSTED
OPERATING SYSTEMS 201
YUEQIANG CHENG AND XUHUA DING
SMARTTOKENS: DELEGABLE ACCESS CONTROL WITH NFC-ENABLED SMARTPHONES 219
ALEXANDRA DMITRIENKO, AHMAD-REZA SADEGHI, SANDEEP TAMRAKAR, AND
CHRISTIAN WACHSMANN
A BELIEF LOGIC FOR ANALYZING SECURITY OF WEB PROTOCOLS 239
APURVA KUMAR
PROVENANCE-BASED MODEL FOR VERIFYING TRUST-PROPERTIES 255
CORNELIUS NAMILUKO AND ANDREW MARTIN
S O C I O - E C O N O M I C S T R A N D
ON THE PRACTICALITY OF MOTION BASED KEYSTROKE INFERENCE ATTACK 273
LIANG CAI AND HAO CHEN
ANDROIDLEAKS: AUTOMATICALLY DETECTING POTENTIAL PRIVACY LEAKS IN ANDROID
APPLICATIONS ON A LARGE SCALE 291
CLINT GIBLER, JONATHAN CRUSSELL, JEREMY ERICKSON. AND HAO CHEN
WHY TRUST SEALS DON'T WORK: A STUDY OF USER PERCEPTIONS AND BEHAVIOR 308
IACOVOS KIRLAPPOS, M. ANGELA SASSE, AND, NIGEL HARVEY
LAUNCHING THE NEW PROFILE ON FACEBOOK: UNDERSTANDING THE TRIGGERS AND
OUTCOMES OF USERS' PRIVACY CONCERNS 325
SAIJING ZHENG. PAN SHI, HENG XU, AND CHENG ZHANG
A U T H O R I N D E X 341 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV040244118 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)796275819 (DE-599)DNB1022401580 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040244118</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120622</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120611s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N22</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1022401580</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642309208</subfield><subfield code="9">3-642-30920-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642309205</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-30920-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642309205</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86115664</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)796275819</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1022401580</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trust and trustworthy computing</subfield><subfield code="b">5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings</subfield><subfield code="c">Stefan Katzenbeisser ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 339 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7344</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Wien</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katzenbeisser, Stefan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">TRUST</subfield><subfield code="n">5</subfield><subfield code="d">2012</subfield><subfield code="c">Wien</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1023232863</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-30921-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7344</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7344</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4040587&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025100251&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025100251</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Wien gnd-content |
genre_facet | Konferenzschrift 2012 Wien |
id | DE-604.BV040244118 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:14:51Z |
institution | BVB |
institution_GND | (DE-588)1023232863 |
isbn | 3642309208 9783642309205 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025100251 |
oclc_num | 796275819 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XII, 339 S. graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Trust and trustworthy computing 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings Stefan Katzenbeisser ... (eds.) Berlin [u.a.] Springer 2012 XII, 339 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7344 Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Wien gnd-content Trusted Computing (DE-588)7562931-8 s DE-604 Katzenbeisser, Stefan Sonstige oth TRUST 5 2012 Wien Sonstige (DE-588)1023232863 oth Erscheint auch als Online-Ausgabe 978-3-642-30921-2 Lecture notes in computer science 7344 (DE-604)BV000000607 7344 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4040587&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025100251&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Trust and trustworthy computing 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings Lecture notes in computer science Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)7562931-8 (DE-588)1071861417 |
title | Trust and trustworthy computing 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings |
title_auth | Trust and trustworthy computing 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings |
title_exact_search | Trust and trustworthy computing 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings |
title_full | Trust and trustworthy computing 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings Stefan Katzenbeisser ... (eds.) |
title_fullStr | Trust and trustworthy computing 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings Stefan Katzenbeisser ... (eds.) |
title_full_unstemmed | Trust and trustworthy computing 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings Stefan Katzenbeisser ... (eds.) |
title_short | Trust and trustworthy computing |
title_sort | trust and trustworthy computing 5th international conference trust 2012 vienna austria june 13 15 2012 proceedings |
title_sub | 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings |
topic | Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Trusted Computing Konferenzschrift 2012 Wien |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4040587&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025100251&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT katzenbeisserstefan trustandtrustworthycomputing5thinternationalconferencetrust2012viennaaustriajune13152012proceedings AT trustwien trustandtrustworthycomputing5thinternationalconferencetrust2012viennaaustriajune13152012proceedings |