Trusted Computing

Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings.

  • Liqun Chen
  • Chris J. Mitchell
  • Andrew Martin
Conference proceedings Trust 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5471)

Table of contents

  1. Front Matter
  2. Implementation of Trusted Computing

    1. Paul England, Talha Tariq
      Pages 1-13
    2. Loïc Duflot, Olivier Levillain, Benjamin Morin
      Pages 14-28
    3. Kurt Dietrich, Johannes Winter
      Pages 29-44
    4. Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy
      Pages 45-62
  3. Attestation

    1. Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali
      Pages 63-80
    2. Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra, Francesco Ceccarelli
      Pages 81-100
  4. PKI for Trusted Computing

    1. Martin Pirker, Ronald Toegl, Daniel Hein, Peter Danner
      Pages 101-119
    2. Stefan Katzenbeisser, Klaus Kursawe, Frederic Stumpf
      Pages 120-132
  5. Applications I

    1. Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee et al.
      Pages 133-152
    2. Sven Türpe, Andreas Poller, Jan Steffan, Jan-Peter Stotz, Jan Trukenmüller
      Pages 183-196
  6. Applications II

    1. Steffen Schulz, Ahmad-Reza Sadeghi
      Pages 197-216
    2. Christopher Soghoian, Imad Aad
      Pages 217-239
    3. Eimear Gallery, Aarthi Nagarajan, Vijay Varadharajan
      Pages 240-263
  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Second International Conference on Trusted Computing, TRUST 2009, held in Oxford, UK, in April 2009.

The 15 revised full papers presented were carefully selected during two rounds of reviewing and improvement from an initial total of 33 submissions. The papers cover the core issues of trust in IT systems and present current research, devoted to technical aspects of trusted computing. The papers are organized in topical sections on implementation of trusted computing, attestation, PKI for trusted computing, applications.

Keywords

PKI anonymity authentication direct anonymous attestation embedded trusted computing emergency response formal models and verification identification java malicious software man-in-the-middle mobile identity policy enforcement privacy public

Editors and affiliations

  • Liqun Chen
    • 1
  • Chris J. Mitchell
    • 2
  • Andrew Martin
    • 3
  1. 1.Hewlett Packard LabsBristolUK
  2. 2.Information Security Group, Royal HollowayUniversity of LondonSurreyUK
  3. 3.Oxford University Computing LaboratoryOxfordUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-00587-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-00586-2
  • Online ISBN 978-3-642-00587-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book