Trusted Systems

5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings

  • Roderick Bloem
  • Peter Lipp
Conference proceedings INTRUST 2013
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8292)

Table of contents

  1. Front Matter
  2. Session 1: Hardware-Based Security and Applications

  3. Session 2: Access Control, Integrity and Policy Enforcement

    1. Michael Velten, Sascha Wessel, Frederic Stumpf, Claudia Eckert
      Pages 53-69
    2. Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra
      Pages 70-84
    3. Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin
      Pages 85-102
  4. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.

Keywords

access control framework hardware-based security integrity policy enforcement

Editors and affiliations

  • Roderick Bloem
    • 1
  • Peter Lipp
    • 2
  1. 1.Institute for Applied Processing and CommunicationsGraz University of TechnologyAustria
  2. 2.Institute for Applied Processing and CommunicationsGraz University of TechnologyGrazAustria

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-03491-1
  • Copyright Information Springer International Publishing Switzerland 2013
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-03490-4
  • Online ISBN 978-3-319-03491-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book