Skip to main content
  • Conference proceedings
  • © 2013

Trust and Trustworthy Computing

6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings

  • Up-to-date results

  • Fast track conference proceedings

  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7904)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Trust: International Conference on Trust and Trustworthy Computing

Conference proceedings info: Trust 2013.

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-38908-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 54.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (24 papers)

  1. Front Matter

  2. Technical Strand

    1. KISS: “Key It Simple and Secure” Corporate Key Management

      • Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil Gligor
      Pages 1-18
    2. Improving Trusted Tickets with State-Bound Keys

      • Jan Nordholz, Ronald Aigner, Paul England
      Pages 37-46
    3. Group Signatures on Mobile Devices: Practical Experiences

      • Klaus Potzmader, Johannes Winter, Daniel Hein, Christian Hanser, Peter Teufl, Liqun Chen
      Pages 47-64
    4. Limiting Data Exposure in Monitoring Multi-domain Policy Conformance

      • Mirko Montanari, Jun Ho Huh, Rakesh B. Bobba, Roy H. Campbell
      Pages 65-82
    5. Towards Trustworthy Network Measurements

      • Ghassan O. Karame
      Pages 83-91
    6. Stochastic Model of a Metastability-Based True Random Number Generator

      • Molka Ben-Romdhane, Tarik Graba, Jean-Luc Danger
      Pages 92-105
    7. Tapping and Tripping with NFC

      • Sandeep Tamrakar, Jan-Erik Ekberg
      Pages 115-132
    8. TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications

      • Wei Feng, Dengguo Feng, Ge Wei, Yu Qin, Qianying Zhang, Dexian Chang
      Pages 133-141
    9. TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas

      • Chris Burnett, Peter Edwards, Timothy J. Norman, Liang Chen, Yogachandran Rahulamathavan, Mariesha Jaffray et al.
      Pages 142-150
    10. First-Class Labels: Using Information Flow to Debug Security Holes

      • Eric Hennigan, Christoph Kerschbaumer, Stefan Brunthaler, Per Larsen, Michael Franz
      Pages 151-168
    11. A Framework for Evaluating Mobile App Repackaging Detection Algorithms

      • Heqing Huang, Sencun Zhu, Peng Liu, Dinghao Wu
      Pages 169-186
    12. Towards Precise and Efficient Information Flow Control in Web Browsers

      • Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz
      Pages 187-195
  3. Socio-Economic Strand

    1. Contextualized Web Warnings, and How They Cause Distrust

      • Steffen Bartsch, Melanie Volkamer, Heike Theuerling, Fatih Karayumak
      Pages 205-222
    2. All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things

      • Marc Busch, Christina Hochleitner, Mario Lorenz, Trenton Schulz, Manfred Tscheligi, Eckhart Wittstock
      Pages 223-231
    3. Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach

      • Gabrielle Anderson, Matthew Collinson, David Pym
      Pages 232-249

Other Volumes

  1. Trust and Trustworthy Computing

    6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings

About this book

This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.

Keywords

  • Web security
  • android
  • e-payment
  • malware
  • social media
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Department of Computing, Imperial College London, London, United Kingdom

    Michael Huth

  • Nokia Research Center, Finland

    N. Asokan

  • Department of Computer Science, ETH Zurich, Switzerland

    Srdjan Čapkun

  • University of Oxford, UK

    Ivan Flechais

  • Information Security Group, Royal Holloway University of London, Egham, UK

    Lizzie Coles-Kemp

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-38908-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 54.99
Price excludes VAT (USA)