Skip to main content
  • Conference proceedings
  • © 2014

Trust and Trustworthy Computing

7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8564)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Trust: International Conference on Trust and Trustworthy Computing

Conference proceedings info: Trust 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

  2. TPM 2.0

    1. DAA-Related APIs in TPM 2.0 Revisited

      • Li Xi, Kang Yang, Zhenfeng Zhang, Dengguo Feng
      Pages 1-18
    2. Continuous Tamper-Proof Logging Using TPM 2.0

      • Arunesh Sinha, Limin Jia, Paul England, Jacob R. Lorch
      Pages 19-36
  3. Trust in Embedded and Mobile Systems

    1. Affordable Separation on Embedded Platforms

      • Oliver Schwarz, Christian Gehrmann, Viktor Do
      Pages 37-54
    2. Owner-Centric Protection of Unstructured Data on Smartphones

      • Yajin Zhou, Kapil Singh, Xuxian Jiang
      Pages 55-73
    3. On Usable Location Privacy for Android with Crowd-Recommendations

      • Benjamin Henne, Christian Kater, Matthew Smith
      Pages 74-82
  4. Physical Unclonable Functions

    1. Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs

      • André Schaller, Tolga Arul, Vincent van der Leest, Stefan Katzenbeisser
      Pages 83-100
    2. Evaluation of Bistable Ring PUFs Using Single Layer Neural Networks

      • Dieter Schuster, Robert Hesselbarth
      Pages 101-109
  5. Trust in the Web

    1. Large-Scale Security Analysis of the Web: Challenges and Findings

      • Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, Wouter Joosen
      Pages 110-126
    2. Towards a Vulnerability Tree Security Evaluation of OpenStack’s Logical Architecture

      • Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi
      Pages 127-142
    3. PrivLoc: Preventing Location Tracking in Geofencing Services

      • Jens Mathias Bohli, Dan Dobre, Ghassan O. Karame, Wenting Li
      Pages 143-160
  6. Trust and Trustworthiness

    1. Hiding Transaction Amounts and Balances in Bitcoin

      • Elli Androulaki, Ghassan O. Karame
      Pages 161-178
    2. Integration of Data-Minimising Authentication into Authorisation Systems

      • Dhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog
      Pages 179-187
    3. Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant

      • Vinh Bui, Richard Verhoeven, Johan Lukkien
      Pages 188-205
  7. Poster Abstracts

    1. Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems

      • Nazila Gol Mohammadi, Torsten Bandyszak, Sachar Paulus, Per HÃ¥kon Meland, Thorsten Weyer, Klaus Pohl
      Pages 206-207
    2. Authentication System Using Encrypted Discrete Biometrics Data

      • Kazuo Ohzeki, YuanYu Wei, Masaaki Kajihara, Masahiro Takatsuka, Yutaka Hirakawa, Toru Sugimoto
      Pages 210-211
    3. On the Development of Automated Forensic Analysis Methods for Mobile Devices

      • Panagiotis Andriotis, Theo Tryfonas, George Oikonomou, Shancang Li, Zacharias Tzermias, Konstantinos Xynos et al.
      Pages 212-213
    4. A Trusted Knowledge Management System for Multi-layer Threat Analysis

      • Thanasis Petsas, Kazuya Okada, Hajime Tazaki, Gregory Blanc, PaweÅ‚ PawliÅ„ski
      Pages 214-215
    5. Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive Dimensions

      • Ying He, Chris Johnson, Maria Evangelopoulou, Zheng-Shuai Lin
      Pages 216-217

Other Volumes

  1. Trust and Trustworthy Computing

About this book

This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.

Editors and Affiliations

  • Chair for Systems Security, Ruhr-University Bochum, Bochum, Germany

    Thorsten Holz

  • Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Greece

    Sotiris Ioannidis

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access