Paul England, Talha Tariq (auth.), Liqun Chen, Chris J. Mitchell, Andrew Martin (eds.)3642005861, 9783642005862
This book constitutes the refereed proceedings of the Second International Conference on Trusted Computing, TRUST 2009, held in Oxford, UK, in April 2009.
The 15 revised full papers presented were carefully selected during two rounds of reviewing and improvement from an initial total of 33 submissions. The papers cover the core issues of trust in IT systems and present current research, devoted to technical aspects of trusted computing. The papers are organized in topical sections on implementation of trusted computing, attestation, PKI for trusted computing, applications.
Table of contents :
Front Matter….Pages –
Towards a Programmable TPM….Pages 1-13
ACPI: Design Principles and Concerns….Pages 14-28
Implementation Aspects of Mobile and Embedded Trusted Computing….Pages 29-44
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels….Pages 45-62
Remote Attestation of Attribute Updates and Information Flows in a UCON System….Pages 63-80
Measuring Semantic Integrity for Remote Attestation….Pages 81-100
A PrivacyCA for Anonymity and Trust….Pages 101-119
Revocation of TPM Keys….Pages 120-132
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture….Pages 133-152
Trustable Remote Verification of Web Services….Pages 153-168
Trustworthy Log Reconciliation for Distributed Virtual Organisations….Pages 169-182
Attacking the BitLocker Boot Process….Pages 183-196
Secure VPNs for Trusted Computing Environments….Pages 197-216
Merx: Secure and Privacy Preserving Delegated Payments….Pages 217-239
A Property-Dependent Agent Transfer Protocol….Pages 240-263
Back Matter….Pages –
Reviews
There are no reviews yet.