Trusted Systems

First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers

  • Liqun Chen
  • Moti Yung
Conference proceedings INTRUST 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6163)

Table of contents

  1. Front Matter
  2. Invited Talk

  3. Secure Storage

  4. Attestation

    1. Liang Gu, Yueqiang Cheng, Xuhua Ding, Robert H. Deng, Yao Guo, Weizhong Shao
      Pages 60-72
    2. Tamleek Ali Tanveer, Masoom Alam, Mohammad Nauman
      Pages 73-87
  5. Trusted Network

    1. Ingo Bente, Joerg Vieweg, Josef von Helden
      Pages 129-145
  6. Virtualization

    1. Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi et al.
      Pages 156-179
    2. Serdar Cabuk, Liqun Chen, David Plaquin, Mark Ryan
      Pages 180-196
  7. Applications

    1. Jianhua Liao, Yong Zhao, Changxiang Shen
      Pages 197-211
    2. Zheng Yan, Yan Dong, Valtteri Niemi, Guoliang Yu
      Pages 212-226
    3. Zhenlong Du, Xiaoli Li, Kangkang Shen
      Pages 227-235
  8. Supporting Technology

    1. Zhongming Wu, Yiyuan Luo, Xuejia Lai, Bo Zhu
      Pages 236-249
    2. Bo Zhu, Kefei Chen, Xuejia Lai
      Pages 250-262
  9. Back Matter

About these proceedings


This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.


Java TPCM attestation cryptanalysis privacy security trust trusted computing virtual domains

Editors and affiliations

  • Liqun Chen
    • 1
  • Moti Yung
    • 2
  1. 1.Hewlett Packard LabsBristolUK
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-14596-4
  • Online ISBN 978-3-642-14597-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site