Trusted Computing Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings / edited by Liqun Chen, Chris J. Mitchell, Andrew Martin.

This book constitutes the refereed proceedings of the Second International Conference on Trusted Computing, TRUST 2009, held in Oxford, UK, in April 2009. The 15 revised full papers presented were carefully selected during two rounds of reviewing and improvement from an initial total of 33 submissio...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Chen, Liqun (Editor), Mitchell, Chris J. (Editor), Martin, Andrew (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edition:1st ed. 2009.
Series:Security and Cryptology ; 5471
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3262626
003 MWH
005 20191023122124.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642005879 
024 7 |a 10.1007/978-3-642-00587-9  |2 doi 
035 |a (DE-He213)978-3-642-00587-9 
050 4 |a E-Book 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
245 1 0 |a Trusted Computing  |h [electronic resource] :  |b Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings /  |c edited by Liqun Chen, Chris J. Mitchell, Andrew Martin. 
250 |a 1st ed. 2009. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a X, 265 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 5471 
490 1 |a Springer eBook Collection 
505 0 |a Implementation of Trusted Computing -- Towards a Programmable TPM -- ACPI: Design Principles and Concerns -- Implementation Aspects of Mobile and Embedded Trusted Computing -- Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels -- Attestation -- Remote Attestation of Attribute Updates and Information Flows in a UCON System -- Measuring Semantic Integrity for Remote Attestation -- PKI for Trusted Computing -- A PrivacyCA for Anonymity and Trust -- Revocation of TPM Keys -- Applications I -- Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture -- Trustable Remote Verification of Web Services -- Trustworthy Log Reconciliation for Distributed Virtual Organisations -- Attacking the BitLocker Boot Process -- Applications II -- Secure VPNs for Trusted Computing Environments -- Merx: Secure and Privacy Preserving Delegated Payments -- A Property-Dependent Agent Transfer Protocol. 
520 |a This book constitutes the refereed proceedings of the Second International Conference on Trusted Computing, TRUST 2009, held in Oxford, UK, in April 2009. The 15 revised full papers presented were carefully selected during two rounds of reviewing and improvement from an initial total of 33 submissions. The papers cover the core issues of trust in IT systems and present current research, devoted to technical aspects of trusted computing. The papers are organized in topical sections on implementation of trusted computing, attestation, PKI for trusted computing, applications. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Computer security. 
650 0 |a Computer communication systems. 
650 0 |a Software engineering. 
650 0 |a Data encryption (Computer science). 
650 0 |a Application software. 
650 0 |a User interfaces (Computer systems). 
690 |a Electronic resources (E-books) 
700 1 |a Chen, Liqun.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Mitchell, Chris J.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Martin, Andrew.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Security and Cryptology ;  |v 5471 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-642-00587-9  |3 Click to view e-book  |t 0 
907 |a .b32626265  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g gw   |h 0  |i 1 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i21757884  |z 02-26-20 
999 f f |i f6ee9f27-a2a3-51c3-a7ac-11e50332a283  |s 07cda282-52b8-56ed-8d34-310e4517b668  |t 0 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |t 0  |e E-Book  |h Library of Congress classification  |i Elec File