Skip to main content
  • Conference proceedings
  • © 2008

Trusted Computing - Challenges and Applications

First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4968)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Trust: International Conference on Trust and Trustworthy Computing

Conference proceedings info: Trust 2008.

Buy it now

Buying options

eBook USD 69.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (14 papers)

  1. Front Matter

  2. TRUST 2008

    1. TOCTOU, Traps, and Trusted Computing

      • Sergey Bratus, Nihal D’Cunha, Evan Sparks, Sean W. Smith
      Pages 14-32
    2. A Software-Based Trusted Platform Module Emulator

      • Mario Strasser, Heiko Stamer
      Pages 33-47
    3. Towards Trust Services for Language-Based Virtual Machines for Grid Computing

      • Tobias Vejda, Ronald Toegl, Martin Pirker, Thomas Winkler
      Pages 48-59
    4. Embedded Trusted Computing with Authenticated Non-volatile Memory

      • Dries Schellekens, Pim Tuyls, Bart Preneel
      Pages 60-74
    5. The Zurich Trusted Information Channel – An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks

      • Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch
      Pages 75-91
    6. Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI

      • Konstantin Hyppönen, Marko Hassinen, Elena Trichina
      Pages 107-118
    7. Para-Virtualized TPM Sharing

      • Paul England, Jork Loeser
      Pages 119-132
    8. Slicing for Security of Code

      • Benjamin Monate, Julien Signoles
      Pages 133-142
    9. Trusted Computing Serving an Anonymity Service

      • Alexander Böttcher, Bernhard Kauer, Hermann Härtig
      Pages 143-154
    10. Combining Biometric Authentication with Privacy-Enhancing Technologies

      • Konstantin Hyppönen, Marko Hassinen, Elena Trichina
      Pages 155-165
    11. A New Direct Anonymous Attestation Scheme from Bilinear Maps

      • Ernie Brickell, Liqun Chen, Jiangtao Li
      Pages 166-178
    12. On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA)

      • Adrian Leung, Liqun Chen, Chris J. Mitchell
      Pages 179-190
  3. Back Matter

Other Volumes

  1. Trusted Computing - Challenges and Applications

About this book

This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. The aim of the conference was to create a joint scienti?c and networking platform covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international research groups and projects in closely related ?elds. The organizers received 43 submissions from 17 countries. Each of the s- mittedpaperswasreviewedbythreereviewers.Basedonthesereviews13papers were selected as suitable for the conference and the authors were asked to p- sent their work. Further, six renowned speakers from academia, industry and the European Commission were invited for keynotes. The accepted papers are published in this volume together with one paper from Paul England, one of the invited speakers at TRUST 2008. TheconferencewassupportedbytheEuropeanCommissionviatheOpen-TC project (FP6 IST-027635), by the Austrian Research Promotion Agency (FFG) and by the city of Villach.

Bibliographic Information

Buy it now

Buying options

eBook USD 69.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access