Trust and trustworthy computing: 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7904 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Weitere Ausgabe: Online-Ausg., Trust and Trustworthy Computing |
Beschreibung: | XIII, 278 S. 235 mm x 155 mm |
ISBN: | 3642389074 9783642389078 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041104486 | ||
003 | DE-604 | ||
005 | 20140212 | ||
007 | t| | ||
008 | 130624s2013 gw |||| 10||| eng d | ||
015 | |a 13,N22 |2 dnb | ||
016 | 7 | |a 103477803X |2 DE-101 | |
020 | |a 3642389074 |9 3-642-38907-4 | ||
020 | |a 9783642389078 |c Pb. : EUR 49.22 (DE) (freier Pr.), EUR 50.60 (AT) (freier Pr.), sfr 61.50 (freier Pr.) |9 978-3-642-38907-8 | ||
035 | |a (OCoLC)854823669 | ||
035 | |a (DE-599)DNB103477803X | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Trust and trustworthy computing |b 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings |c Michael Huth ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a XIII, 278 S. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7904 | |
500 | |a Weitere Ausgabe: Online-Ausg., Trust and Trustworthy Computing | ||
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z London |2 gnd-content | |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Huth, Michael |d 1962- |e Sonstige |0 (DE-588)123627613 |4 oth | |
711 | 2 | |a TRUST |n 6 |d 2013 |c London |j Sonstige |0 (DE-588)1036391566 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-38908-5 |
830 | 0 | |a Lecture notes in computer science |v 7904 |w (DE-604)BV000000607 |9 7904 | |
856 | 4 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4335607&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026080810&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026080810 |
Datensatz im Suchindex
_version_ | 1820875464685649920 |
---|---|
adam_text |
TABLE OF CONTENTS
TECHNICAL STRAND
KISS: "KEY IT SIMPLE AND SECURE" CORPORATE KEY MANAGEMENT 1
ZONGWEI ZHOU, JUN HAN, YUE-HSUN LIN, ADRIAN PERRIG, AND
VIRGIL GLIGOR
GUARDIAN: HYPERVISOR AS SECURITY FOOTHOLD FOR PERSONAL COMPUTERS . 19
YUEQIANG CHENG AND XUHUA DING
IMPROVING TRUSTED TICKETS WITH STATE-BOUND KEYS 37
JAN NORDHOLZ, RONALD AIGNER, AND PAUL ENGLAND
GROUP SIGNATURES ON MOBILE DEVICES: PRACTICAL EXPERIENCES 47
KLAUS POTZMADER, JOHANNES WINTER, DANIEL HEIN, CHRISTIAN HANSER,
PETER TEUFL, AND LIQUN CHEN
LIMITING DATA EXPOSURE IN MONITORING MULTI-DOMAIN POLICY
CONFORMANCE 65
MIRKO MONTANARI, JUN HO HUH, R.AKESH B. BOBBA, AND
ROY H. CAMPBELL
TOWARDS TRUSTWORTHY NETWORK MEASUREMENTS 83
GHASSAN 0. KARAME
STOCHASTIC MODEL OF A METASTABILITY-BASED TRUE RANDOM NUMBER
GENERATOR 92
MOLKA BEN-R.OMDHANE, TARIK GRABA, AND JEAN-LUC DANGER
SEMI-AUTOMATED PROTOTYPING OF A TPM V2 SOFTWARE AND HARDWARE
SIMULATION PLATFORM 106
MARTIN PIRKER AND JOHANNES WINTER
TAPPING AND TRIPPING WITH NFC 115
SANDEEP TAMRAKAR AND JAN-ERIK EKBERG
TEEM: A USER-ORIENTED TRUSTED MOBILE DEVICE FOR MULTI-PLATFORM
SECURITY APPLICATIONS 133
WEI FENG, DENGGUO FENG, GE WEI, YU QIN, QIANYING ZHANG, AND
DEXIAN CHANG
TRUMP: A TRUSTED MOBILE PLATFORM FOR SELF-MANAGEMENT OF CHRONIC
ILLNESS IN RURAL AREAS 142
CHRIS BURNETT, PETER EDWARDS, TIMOTHY J. NORMAN,
LIANG CHEN, YOGACHANDRAN R.AHULAMATHAVAN,
MARIESHA JAFFRAY, AND EDOARDO PIGNOTTI
HTTP://D-NB.INFO/103477803X
XII
TABLE OF CONTENTS
FIRST-CLASS LABELS: USING INFORMATION FLOW TO DEBUG SECURITY HOLES .
151
ERIC HENNIGAN, CHRISTOPH KERSCHBAUMER, STEFAN BRUNTHALER,
PER LARSEN, AND MICHAEL FRANZ
A FRAMEWORK FOR EVALUATING MOBILE APP REPACKAGING DETECTION
ALGORITHMS 169
HEQING HUANG, SENCUN ZHU, PENG LIU, AND DINGHAO WU
TOWARDS PRECISE AND EFFICIENT INFORMATION FLOW CONTROL IN WEB
BROWSERS 187
CHRISTOPH KERSCHBAUMER, ERIC HENNIGAN, PER LARSEN,
STEFAN BRUNTHALER, AND MICHAEL FRANZ
SOCIO-ECONOMIC STRAND
GRANDDAUGHTER BEWARE! AN INTERGENERATIONAL CASE STUDY OF MANAGING
TRUST ISSUES IN THE USE OF FACEBOOK 196
ANN LIGHT AND LIZZIE COLES-KEMP
CONTEXTUALIZED WEB WARNINGS, AND HOW THEY CAUSE DISTRUST 205
STEFFEN BARTSCH, MELANIE VOLKAMER, HEIKE THEUERLING, AND
FATIH KARAYUMAK
ALL IN: TARGETING TRUSTWORTHINESS FOR SPECIAL NEEDS USER GROUPS
IN THE INTERNET OF THINGS 223
MARC BUSCH, CHRISTINA HOCHLEITNER, MARIO LORENZ, TRENTON SCHULZ,
MANFRED TSCHELIGI, AND ECKHART WITTSTOCK
TRUST DOMAINS: AN ALGEBRAIC, LOGICAL, AND UTILITY-THEORETIC
APPROACH 232
GABRIELLE ANDERSON, MATTHEW COLLINSON, AND DAVID PYM
"FAIRLY TRUTHFUL": THE IMPACT OF PERCEIVED EFFORT, FAIRNESS, RELEVANCE,
AND SENSITIVITY ON PERSONAL DATA DISCLOSURE 250
MIGUEL MALHEIROS, SOREN PREIBUSCH, AND M. ANGELA SASSE
POSTER ABSTRACTS
FORMAL EVALUATION OF PERSONA TRUSTWORTHINESS WITH EUSTACE 267
SHAMAL FAILY, DAVID POWER, PHILIP ARMSTRONG, AND IVAN FLECHAIS
IDENTITY IMPLIES TRUST IN DISTRIBUTED SYSTEMS - A NOVEL APPROACH 269
LYZGEO MERIN KOSHY, MARC CONRAD, MITUL SHUKLA, AND TIM FRENCH
NON-INTRUSIVE AND TRANSPARENT AUTHENTICATION ON SMART PHONES 271
NICHOLAS MICALLEF, MIKE JUST, LYNNE BAILLIE, AND GUNES KAYACIK
QUAESTIO-IT.COM: FROM DEBATES TOWARDS TRUSTWORTHY ANSWERS 273
VALENTINOS EVRIPIDOU AND FRANCESCA TONI
TABLE OF CONTENTS XIII
TOWARDS VERIFIABLE TRUST MANAGEMENT FOR SOFTWARE EXECUTION 275
MICHAEL HUTH AND JIM HUAN-PU KUO
AUTHOR INDEX 277 |
any_adam_object | 1 |
author_GND | (DE-588)123627613 |
building | Verbundindex |
bvnumber | BV041104486 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 050f |
ctrlnum | (OCoLC)854823669 (DE-599)DNB103477803X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041104486</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140212</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">130624s2013 gw |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,N22</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">103477803X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642389074</subfield><subfield code="9">3-642-38907-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642389078</subfield><subfield code="c">Pb. : EUR 49.22 (DE) (freier Pr.), EUR 50.60 (AT) (freier Pr.), sfr 61.50 (freier Pr.)</subfield><subfield code="9">978-3-642-38907-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)854823669</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB103477803X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trust and trustworthy computing</subfield><subfield code="b">6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings</subfield><subfield code="c">Michael Huth ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 278 S.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7904</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Weitere Ausgabe: Online-Ausg., Trust and Trustworthy Computing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">London</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Huth, Michael</subfield><subfield code="d">1962-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)123627613</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">TRUST</subfield><subfield code="n">6</subfield><subfield code="d">2013</subfield><subfield code="c">London</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1036391566</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-38908-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7904</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7904</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4335607&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026080810&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026080810</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 London gnd-content |
genre_facet | Konferenzschrift 2013 London |
id | DE-604.BV041104486 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:16:03Z |
institution | BVB |
institution_GND | (DE-588)1036391566 |
isbn | 3642389074 9783642389078 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026080810 |
oclc_num | 854823669 |
open_access_boolean | |
owner | DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-83 DE-11 DE-91G DE-BY-TUM |
physical | XIII, 278 S. 235 mm x 155 mm |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Trust and trustworthy computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings Michael Huth ... (eds.) Berlin [u.a.] Springer 2013 XIII, 278 S. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7904 Weitere Ausgabe: Online-Ausg., Trust and Trustworthy Computing Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 London gnd-content Trusted Computing (DE-588)7562931-8 s DE-604 Huth, Michael 1962- Sonstige (DE-588)123627613 oth TRUST 6 2013 London Sonstige (DE-588)1036391566 oth Erscheint auch als Online-Ausgabe 978-3-642-38908-5 Lecture notes in computer science 7904 (DE-604)BV000000607 7904 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4335607&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026080810&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Trust and trustworthy computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings Lecture notes in computer science Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)7562931-8 (DE-588)1071861417 |
title | Trust and trustworthy computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings |
title_auth | Trust and trustworthy computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings |
title_exact_search | Trust and trustworthy computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings |
title_full | Trust and trustworthy computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings Michael Huth ... (eds.) |
title_fullStr | Trust and trustworthy computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings Michael Huth ... (eds.) |
title_full_unstemmed | Trust and trustworthy computing 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings Michael Huth ... (eds.) |
title_short | Trust and trustworthy computing |
title_sort | trust and trustworthy computing 6th international conference trust 2013 london uk june 17 19 2013 proceedings |
title_sub | 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, proceedings |
topic | Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Trusted Computing Konferenzschrift 2013 London |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4335607&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026080810&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT huthmichael trustandtrustworthycomputing6thinternationalconferencetrust2013londonukjune17192013proceedings AT trustlondon trustandtrustworthycomputing6thinternationalconferencetrust2013londonukjune17192013proceedings |