Trusted Systems Trusted Systems

Trusted Systems

    • US$69.99
    • US$69.99

출판사 설명

This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.

장르
컴퓨터 및 인터넷
출시일
2010년
7월 10일
언어
EN
영어
길이
277
페이지
출판사
Springer Berlin Heidelberg
판매자
Springer Nature B.V.
크기
2.9
MB
Trust and Trustworthy Computing Trust and Trustworthy Computing
2010년
Trusted Computing - Challenges and Applications Trusted Computing - Challenges and Applications
2008년
Foundations of Security Analysis and Design IV Foundations of Security Analysis and Design IV
2007년
Trusted Computing Trusted Computing
2009년
Security and Trust Management Security and Trust Management
2019년
Advances in Information Security and Its Application Advances in Information Security and Its Application
2009년
Information and Communications Security Information and Communications Security
2022년
Control of Axially Moving Systems Control of Axially Moving Systems
2021년
Computer Security – ESORICS 2020 Computer Security – ESORICS 2020
2020년
Computer Security – ESORICS 2020 Computer Security – ESORICS 2020
2020년
Information Security Information Security
2018년
Information and Communications Security Information and Communications Security
2018년