Skip to main content
  • Conference proceedings
  • © 2009

Trusted Computing

Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5471)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Trust: International Conference on Trust and Trustworthy Computing

Conference proceedings info: Trust 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (15 papers)

  1. Front Matter

  2. Implementation of Trusted Computing

    1. Towards a Programmable TPM

      • Paul England, Talha Tariq
      Pages 1-13
    2. ACPI: Design Principles and Concerns

      • Loïc Duflot, Olivier Levillain, Benjamin Morin
      Pages 14-28
    3. Implementation Aspects of Mobile and Embedded Trusted Computing

      • Kurt Dietrich, Johannes Winter
      Pages 29-44
    4. Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels

      • Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy
      Pages 45-62
  3. Attestation

    1. Remote Attestation of Attribute Updates and Information Flows in a UCON System

      • Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali
      Pages 63-80
    2. Measuring Semantic Integrity for Remote Attestation

      • Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra, Francesco Ceccarelli
      Pages 81-100
  4. PKI for Trusted Computing

    1. A PrivacyCA for Anonymity and Trust

      • Martin Pirker, Ronald Toegl, Daniel Hein, Peter Danner
      Pages 101-119
    2. Revocation of TPM Keys

      • Stefan Katzenbeisser, Klaus Kursawe, Frederic Stumpf
      Pages 120-132
  5. Applications I

    1. Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture

      • Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhaskara, Thuy D. Nguyen, Paul C. Clark, Ruby B. Lee et al.
      Pages 133-152
    2. Attacking the BitLocker Boot Process

      • Sven Türpe, Andreas Poller, Jan Steffan, Jan-Peter Stotz, Jan Trukenmüller
      Pages 183-196
  6. Applications II

    1. Secure VPNs for Trusted Computing Environments

      • Steffen Schulz, Ahmad-Reza Sadeghi
      Pages 197-216
    2. Merx: Secure and Privacy Preserving Delegated Payments

      • Christopher Soghoian, Imad Aad
      Pages 217-239
    3. A Property-Dependent Agent Transfer Protocol

      • Eimear Gallery, Aarthi Nagarajan, Vijay Varadharajan
      Pages 240-263
  7. Back Matter

Other Volumes

  1. Trusted Computing

About this book

Thisvolumecontainsthe15paperspresentedinthetechnicalstrandoftheTrust 2009 conference, held in Oxford, UK in April 2009. Trust 2009 was the second international conference devoted to the technical and socio-economic aspects of trusted computing. The conference had two main strands, one devoted to technical aspects of trusted computing (addressed by these proceedings), and the other devoted to socio-economic aspects. Trust 2009 built on the successful Trust 2008 conference, held in Villach, Austria in March 2008. The proceedings of Trust 2008, containing 14 papers, were published in volume 4968 of the Lecture Notes in Computer Science series. ThetechnicalstrandofTrust2009contained15originalpapersonthedesign and application of trusted computing. For these proceedings the papers have been divided into four main categories, namely: – Implementation of trusted computing – Attestation – PKI for trusted computing – Applications of trusted computing The 15 papers included here were selected from a total of 33 submissions. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. We believe that the result is a high-quality set of papers, some of which have been signi?cantly improved as a result of the refereeing process. We would also like to thank all the authors who submitted their papers to the technical strand of the Trust 2009 conference, all external referees, and all the attendees of the conference.

Editors and Affiliations

  • Hewlett Packard Labs, Bristol, UK

    Liqun Chen

  • Information Security Group, Royal Holloway, University of London, Surrey, UK

    Chris J. Mitchell

  • Oxford University Computing Laboratory, Oxford, UK

    Andrew Martin

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access