Trust and Trustworthy Computing

Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings

  • Alessandro Acquisti
  • Sean W. Smith
  • Ahmad-Reza Sadeghi
Conference proceedings Trust 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6101)

Table of contents

  1. Front Matter
  2. Technical Strand—Full Papers

    1. Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-Pierre Seifert
      Pages 1-15
    2. Yanlin Li, Jonathan M. McCune, Adrian Perrig
      Pages 16-29
    3. Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, N. Asokan
      Pages 30-46
    4. Emanuele Cesena, Hans Löhr, Gianluca Ramunno, Ahmad-Reza Sadeghi, Davide Vernizzi
      Pages 47-62
    5. Sami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser
      Pages 63-77
    6. Marcel Selhorst, Christian Stüble, Florian Feldmann, Utz Gnaida
      Pages 78-94
    7. Łukasz Krzywiecki, Mirosław Kutyłowski
      Pages 109-123
    8. Christian Stüble, Anoosheh Zaerin
      Pages 124-140
    9. Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn, Adrian Perrig
      Pages 141-165
    10. Ernie Brickell, Jiangtao Li
      Pages 181-195
    11. Jiangtao Li, Anand Rajan
      Pages 196-210
    12. F. John Krautheim, Dhananjay S. Phatak, Alan T. Sherman
      Pages 211-227
    13. Sergey Bratus, Michael E. Locasto, Brian Schulte
      Pages 228-245
  3. Technical Strand—Short Papers

    1. King Ables, Mark D. Ryan
      Pages 246-256
    2. John Lyle, Andrew Martin
      Pages 257-264
    3. Martin Pirker, Ronald Toegl, Michael Gissing
      Pages 265-272
    4. Yin Hu, Berk Sunar
      Pages 273-281
    5. Amir Herzberg, Haya Shulman
      Pages 282-289
    6. Heike Busch, Miroslava Sotáková, Stefan Katzenbeisser, Radu Sion
      Pages 290-297
  4. Socio-Economic Strand

    1. Nikos Vrakas, Christos Kalloniatis, Aggeliki Tsohou, Costas Lambrinoudakis
      Pages 298-307
    2. Nikhil Shetty, Galina Schwartz, Jean Walrand
      Pages 308-322
    3. Jens Grossklags, Svetlana Radosavac, Alvaro A. Cárdenas, John Chuang
      Pages 323-336
    4. Brent Rowe, Dallas Wood, Douglas Reeves
      Pages 337-351
    5. Clark Thomborson
      Pages 352-366
    6. Sergey Bratus, Ashlyn Lembree, Anna Shubina
      Pages 396-416
  5. Workshop on Trust in the Cloud

    1. Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy
      Pages 417-429
  6. Workshop on Security Hardware

  7. Back Matter

About these proceedings


This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June 21–23, 2010. TRUST is a rapidly growing forum for research on the technical and soc- economic aspects of trustworthy infrastructures. TRUST provides an interdis- plinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using, and understanding trustworthy computing systems. The third edition of TRUST welcomed manuscripts in two di?erent tracks: a Technical Strand and a Socio-economic Strand. We assembled an engaging program with 21 peer-reviewed technical papers and nine peer-reviewed soc- economic papers; eight keynotes from industry, academia, and government; and panel discussions on privacy and standards. In addition, this year, TRUST was co-located with four workshops: Trust in Cloud, Hardware Security, Emerging and Future Risks, and Anonymous Signatures. We would like to thank numerous individuals for their e?ort and contri- tion to the conference and for making TRUST 2010 possible: the Organizing Committee members—Nadine Palacios and Marcel Winandy—for their trem- dous help with all aspects of the organization;the Technicaland Socio-economic Program Committee members, whose names are listed on the following pages, together with the names of external reviewers who helped us in the process of selecting manuscripts to be included in the conference proceedings; the keynote and invited speakers; and the invited panel speakers.


PUF TPM cloud computing malicious software mobile identity privacy public key cryptography secure internet banking secure programming security trust trusted computing

Editors and affiliations

  • Alessandro Acquisti
    • 1
  • Sean W. Smith
    • 2
  • Ahmad-Reza Sadeghi
    • 3
  1. 1.Heinz CollegeCarnegie Mellon UniversityPittsburghUSA
  2. 2.Department of Computer Science, 6211 Sudikoff LaboratoryDartmouth CollegeHanoverUSA
  3. 3.System Security LabRuhr University BochumBochumGermany

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-13868-3
  • Online ISBN 978-3-642-13869-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site