Trust and Trustworthy Computing

4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings

  • Jonathan M. McCune
  • Boris Balacheff
  • Adrian Perrig
  • Ahmad-Reza Sadeghi
  • Angela Sasse
  • Yolanta Beres
Conference proceedings Trust 2011

DOI: 10.1007/978-3-642-21599-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6740)

Table of contents

  1. Front Matter
  2. Session 1: Cloud and Virtualization

  3. Session 2: Physically Unclonable Functions

    1. Dominik Merli, Dieter Schuster, Frederic Stumpf, Georg Sigl
      Pages 33-47
    2. Łukasz Krzywiecki, Mirosław Kutyłowski
      Pages 48-62
    3. Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik, Wei Wu
      Pages 63-77
  4. Session 3: Mobile Device Security

    1. Kari Kostiainen, N. Asokan, Jan-Erik Ekberg
      Pages 78-92
    2. Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh
      Pages 93-107
    3. Ingo Bente, Gabi Dreo, Bastian Hellmann, Stephan Heuser, Joerg Vieweg, Josef von Helden et al.
      Pages 108-115
  5. Session 4: Socio-Economic Aspects of Trust

    1. Miguel Malheiros, Charlene Jennett, Will Seager, M. Angela Sasse
      Pages 116-130
    2. Luca Allodi, Luca Chiodi, Marco Cremonini
      Pages 131-145
  6. Session 5: Hardware Trust

    1. Ruirui Huang, David Grawrock, David C. Doughty, G. Edward Suh
      Pages 154-171
    2. Peter Williams, Rick Boivie
      Pages 172-187
    3. Pravin Prabhu, Ameen Akel, Laura M. Grupp, Wing-Kei S. Yu, G. Edward Suh, Edwin Kan et al.
      Pages 188-201
  7. Session 6: Access Control

    1. Mark Baugher, Victor Lortz
      Pages 217-230
    2. Tongbo Luo, Wenliang Du
      Pages 231-238
  8. Session 7: Privacy

    1. Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
      Pages 239-253
    2. Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser, Vijay Varadharajan
      Pages 254-261

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.

The 23 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in technical sessions on cloud and virtualization, physically unclonable functions, mobile device security, socio-economic aspects of trust, hardware trust, access control, privacy, trust aspects of routing, and cryptophysical protocols.

Keywords

authentication device finger prints embedded systems security privacy preserving techniques routing security social network security trust assessment

Editors and affiliations

  • Jonathan M. McCune
    • 1
  • Boris Balacheff
    • 2
  • Adrian Perrig
    • 1
  • Ahmad-Reza Sadeghi
    • 3
  • Angela Sasse
    • 4
  • Yolanta Beres
    • 5
  1. 1.Carnegie Mellon UniversityPittsburghUSA
  2. 2.Hewlett-Packard LabsStoke GiffordUK
  3. 3.TU Darmstadt / Fraunhofer SITDarmstadtGermany
  4. 4.University College LondonLondonUK
  5. 5.Hewlett Packard LabsStoke GiffordUK

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-21598-8
  • Online ISBN 978-3-642-21599-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349