Trust and Trustworthy Computing

4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings

ISBN: 978-3-642-21598-8 (Print) 978-3-642-21599-5 (Online)

Table of contents (23 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Session 1: Cloud and Virtualization

    1. No Access

      Book Chapter

      Pages 1-15

      Verifying Trustworthiness of Virtual Appliances in Collaborative Environments

    2. No Access

      Book Chapter

      Pages 16-32

      Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems

  3. Session 2: Physically Unclonable Functions

    1. No Access

      Book Chapter

      Pages 33-47

      Side-Channel Analysis of PUFs and Fuzzy Extractors

    2. No Access

      Book Chapter

      Pages 48-62

      Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF

    3. No Access

      Book Chapter

      Pages 63-77

      A Practical Device Authentication Scheme Using SRAM PUFs

  4. Session 3: Mobile Device Security

    1. No Access

      Book Chapter

      Pages 78-92

      Practical Property-Based Attestation on Mobile Devices

    2. No Access

      Book Chapter

      Pages 93-107

      Taming Information-Stealing Smartphone Applications (on Android)

    3. No Access

      Book Chapter

      Pages 108-115

      Towards Permission-Based Attestation for the Android Platform

  5. Session 4: Socio-Economic Aspects of Trust

    1. No Access

      Book Chapter

      Pages 116-130

      Trusting to Learn: Trust and Privacy Issues in Serious Games

    2. No Access

      Book Chapter

      Pages 131-145

      Modifying Trust Dynamics through Cooperation and Defection in Evolving Social Networks

    3. No Access

      Book Chapter

      Pages 146-153

      Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites

  6. Session 5: Hardware Trust

    1. No Access

      Book Chapter

      Pages 154-171

      Systematic Security Assessment at an Early Processor Design Stage

    2. No Access

      Book Chapter

      Pages 172-187

      CPU Support for Secure Executables

    3. No Access

      Book Chapter

      Pages 188-201

      Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations

    4. No Access

      Book Chapter

      Pages 202-216

      Enforcing Executing-Implies-Verified with the Integrity-Aware Processor

  7. Session 6: Access Control

    1. No Access

      Book Chapter

      Pages 217-230

      Home-Network Threats and Access Controls

    2. No Access

      Book Chapter

      Pages 231-238

      Contego: Capability-Based Access Control for Web Browsers

  8. Session 7: Privacy

    1. No Access

      Book Chapter

      Pages 239-253

      Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information

    2. No Access

      Book Chapter

      Pages 254-261

      CertainLogic: A Logic for Modeling Trust and Uncertainty

  9. Session 8: Trust Issues in Routing

    1. No Access

      Book Chapter

      Pages 262-276

      AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP

previous Page of 2