Trusted Systems Trusted Systems

Trusted Systems

    • $69.99
    • $69.99

Publisher Description

This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.

GENRE
Computers & Internet
RELEASED
2010
July 10
LANGUAGE
EN
English
LENGTH
277
Pages
PUBLISHER
Springer Berlin Heidelberg
SELLER
Springer Nature B.V.
SIZE
2.9
MB
Trust and Trustworthy Computing Trust and Trustworthy Computing
2010
Trusted Computing - Challenges and Applications Trusted Computing - Challenges and Applications
2008
Foundations of Security Analysis and Design IV Foundations of Security Analysis and Design IV
2007
Trusted Computing Trusted Computing
2009
Security and Trust Management Security and Trust Management
2019
Advances in Information Security and Its Application Advances in Information Security and Its Application
2009
Information and Communications Security Information and Communications Security
2022
Control of Axially Moving Systems Control of Axially Moving Systems
2021
Computer Security – ESORICS 2020 Computer Security – ESORICS 2020
2020
Computer Security – ESORICS 2020 Computer Security – ESORICS 2020
2020
Information Security Information Security
2018
Information and Communications Security Information and Communications Security
2018