Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June 21–23, 2010. TRUST is a rapidly growing forum for research on the technical and soc- economic aspects of trustworthy infrastructures. TRUST provides an interdis- plinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using, and understanding trustworthy computing systems. The third edition of TRUST welcomed manuscripts in two different tracks: a Technical Strand and a Socio-economic Strand. We assembled an engaging program with 21 peer-reviewed technical papers and nine peer-reviewed soc- economic papers; eight keynotes from industry, academia, and government; and panel discussions on privacy and standards. In addition, this year, TRUST was co-located with four workshops: Trust in Cloud, Hardware Security, Emerging and Future Risks, and Anonymous Signatures. We would like to thank numerous individuals for their effort and contri- tion to the conference and for making TRUST 2010 possible: the Organizing Committee members—Nadine Palacios and Marcel Winandy—for their trem- dous help with all aspects of the organization;the Technicaland Socio-economic Program Committee members, whose names are listed on the following pages, together with the names of external reviewers who helped us in the process of selecting manuscripts to be included in the conference proceedings; the keynote and invited speakers; and the invited panel speakers.
1111360757
Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June 21–23, 2010. TRUST is a rapidly growing forum for research on the technical and soc- economic aspects of trustworthy infrastructures. TRUST provides an interdis- plinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using, and understanding trustworthy computing systems. The third edition of TRUST welcomed manuscripts in two different tracks: a Technical Strand and a Socio-economic Strand. We assembled an engaging program with 21 peer-reviewed technical papers and nine peer-reviewed soc- economic papers; eight keynotes from industry, academia, and government; and panel discussions on privacy and standards. In addition, this year, TRUST was co-located with four workshops: Trust in Cloud, Hardware Security, Emerging and Future Risks, and Anonymous Signatures. We would like to thank numerous individuals for their effort and contri- tion to the conference and for making TRUST 2010 possible: the Organizing Committee members—Nadine Palacios and Marcel Winandy—for their trem- dous help with all aspects of the organization;the Technicaland Socio-economic Program Committee members, whose names are listed on the following pages, together with the names of external reviewers who helped us in the process of selecting manuscripts to be included in the conference proceedings; the keynote and invited speakers; and the invited panel speakers.
54.99 In Stock
Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings

Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings

Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings

Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings

Paperback(2010)

$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June 21–23, 2010. TRUST is a rapidly growing forum for research on the technical and soc- economic aspects of trustworthy infrastructures. TRUST provides an interdis- plinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using, and understanding trustworthy computing systems. The third edition of TRUST welcomed manuscripts in two different tracks: a Technical Strand and a Socio-economic Strand. We assembled an engaging program with 21 peer-reviewed technical papers and nine peer-reviewed soc- economic papers; eight keynotes from industry, academia, and government; and panel discussions on privacy and standards. In addition, this year, TRUST was co-located with four workshops: Trust in Cloud, Hardware Security, Emerging and Future Risks, and Anonymous Signatures. We would like to thank numerous individuals for their effort and contri- tion to the conference and for making TRUST 2010 possible: the Organizing Committee members—Nadine Palacios and Marcel Winandy—for their trem- dous help with all aspects of the organization;the Technicaland Socio-economic Program Committee members, whose names are listed on the following pages, together with the names of external reviewers who helped us in the process of selecting manuscripts to be included in the conference proceedings; the keynote and invited speakers; and the invited panel speakers.

Product Details

ISBN-13: 9783642138683
Publisher: Springer Berlin Heidelberg
Publication date: 08/11/2010
Series: Lecture Notes in Computer Science , #6101
Edition description: 2010
Pages: 441
Product dimensions: 6.10(w) x 9.20(h) x 1.00(d)

Table of Contents

Technical Strand-Full Papers

Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform Mohammad Nauman Sohail Khan Xinwen Zhang Jean-Pierre Seifert 1

SBAP: Software-Based Attestation for Peripherals Yanlin Li Jonathan M. McCune Adrian Perrig 16

Key Attestation from Trusted Execution Environments Kari Kostiainen Alexandra Dmitrienko Jan-Erik Ekberg Ahmad-Reza Sadeghi N. Asokan 30

Anonymous Authentication with TLS and DAA Emanuele Cesena, Hans Löhr Gianluca Ramunno Ahmad-Reza Sadeghi Davide Vernizzi 47

Group-Based Attestation: Enhancing Privacy and Management in Remote Atestation Sami Alsouri Özgür Dagdelen Stefan Katzenbeisser 63

Toward a Trusted Mobile Desktop Marcel Selhorst Christian Stüble Florian Feldmann Utz Gnaida 78

Application of Trusted Computing in Automation to Prevent Product Piracy Nora Lieberknecht 95

Lagrangian E-Voting: Verifiability on Demand and Strong Privacy Lukasz Krzywiecki Miroslaw Kutytowski 109

μTSS-A Simplified Trusted Software Stack Christian Stüble Anoosheh Zaerin 124

Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture Amit Vasudevan Jonathan M. McCune Ning Qu Leendert van Doorn Adrian Perrig 141

A DAA Scheme Using Batch Proof and Verification Liqun Chen 166

A Pairing-Based DAA Scheme Further Reducing TPM Resource Ernie Brickell Jiangtao Li 181

An Anonymous Attestation Scheme with Optional Traceability Jiangtao Li Anand Rajan 196

Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing F. John Krautheim Dhananjay S. Phatak Alan T. Sherman 211

SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms Sergey Bratus Michael E. Locasto Brian Schulte 228

Technical Strand-Short Papers

Escrowed Data and the Digital Envelope King ABles Mark D. Ryan 246

Engineering Attestable Services John Lyle Andrew Martin 257

Dynamic Enforcement of Platform Integrity Martin Pirker Ronald Toegl Michael Gissing 265

An Improved Memory Integrity Protection Scheme Yin Hu Berk Sunar 273

Robust Combiners for Software Hardening (Extended Abstract) Amir Herzbery Haya Shulman 282

The PUF Promise Heike Busch Miroslava Sotáková Stefan Katzenbeisser Radu Sion 290

Socio-Economic Strand

Privacy Requirements Engineering for Trustworthy e-Government Services Nikos Vrakas Christos Kalloniatis Aggeliki Tsohou Costas Lambrinoudakis 298

Can Competitive Insurers Improve Network Security? Nikhil Shetty Galina Schwartz Jean Walrand 308

Nudge: Intermediaries' Role in Interdependent Network Security Jens Grossklags Svetlana Radosavac Alvaro A. Cárdenas John Chuang 323

How the Public views Strategies Designed to Reduce the Threat of Botnets Brent Rowe Dallas Wood Douglas Reeves 337

Axiomatic and Behavioural Trust Clark Thomborson 352

The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.Org Jun-E Tan 367

The Role of Soft Information in Trust Building: Evidence from Online Social Lending Stefanie Pötzsch Rainer Böhme 381

Software on the Witness Stand: What Should It Take for Us to Trust It? Sergey Bratus Ashlyn Lembree Anna Shubina 396

Workshop on Trust in the Cloud

Token-Based Cloud Computing: Secure Outsourcing of Data and Arbitrary Computations with Lower Latency Ahmad-Reza Sadeghi Thomas Schneider Marcel Winandy 417

Workshop on Security Hardware

Oblivious Transfer Based on Physical Unclonable Funcations (Extended Abstract) Ulrich Rührmair 430

Author Index 441

From the B&N Reads Blog

Customer Reviews