Skip to main content
  • Conference proceedings
  • © 2010

Trust and Trustworthy Computing

Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6101)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Trust: International Conference on Trust and Trustworthy Computing

Conference proceedings info: Trust 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (31 papers)

  1. Front Matter

  2. Technical Strand—Full Papers

    1. Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform

      • Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-Pierre Seifert
      Pages 1-15
    2. SBAP: Software-Based Attestation for Peripherals

      • Yanlin Li, Jonathan M. McCune, Adrian Perrig
      Pages 16-29
    3. Key Attestation from Trusted Execution Environments

      • Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, N. Asokan
      Pages 30-46
    4. Anonymous Authentication with TLS and DAA

      • Emanuele Cesena, Hans Löhr, Gianluca Ramunno, Ahmad-Reza Sadeghi, Davide Vernizzi
      Pages 47-62
    5. Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation

      • Sami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser
      Pages 63-77
    6. Towards a Trusted Mobile Desktop

      • Marcel Selhorst, Christian Stüble, Florian Feldmann, Utz Gnaida
      Pages 78-94
    7. Lagrangian E-Voting: Verifiability on Demand and Strong Privacy

      • Łukasz Krzywiecki, Mirosław Kutyłowski
      Pages 109-123
    8. μTSS – A Simplified Trusted Software Stack

      • Christian Stüble, Anoosheh Zaerin
      Pages 124-140
    9. Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture

      • Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn, Adrian Perrig
      Pages 141-165
    10. A Pairing-Based DAA Scheme Further Reducing TPM Resources

      • Ernie Brickell, Jiangtao Li
      Pages 181-195
    11. An Anonymous Attestation Scheme with Optional Traceability

      • Jiangtao Li, Anand Rajan
      Pages 196-210
    12. Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing

      • F. John Krautheim, Dhananjay S. Phatak, Alan T. Sherman
      Pages 211-227
    13. SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms

      • Sergey Bratus, Michael E. Locasto, Brian Schulte
      Pages 228-245
  3. Technical Strand—Short Papers

    1. Escrowed Data and the Digital Envelope

      • King Ables, Mark D. Ryan
      Pages 246-256
    2. Engineering Attestable Services

      • John Lyle, Andrew Martin
      Pages 257-264
    3. Dynamic Enforcement of Platform Integrity

      • Martin Pirker, Ronald Toegl, Michael Gissing
      Pages 265-272
    4. An Improved Memory Integrity Protection Scheme

      • Yin Hu, Berk Sunar
      Pages 273-281

Other Volumes

  1. Trust and Trustworthy Computing

About this book

This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June 21–23, 2010. TRUST is a rapidly growing forum for research on the technical and soc- economic aspects of trustworthy infrastructures. TRUST provides an interdis- plinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using, and understanding trustworthy computing systems. The third edition of TRUST welcomed manuscripts in two di?erent tracks: a Technical Strand and a Socio-economic Strand. We assembled an engaging program with 21 peer-reviewed technical papers and nine peer-reviewed soc- economic papers; eight keynotes from industry, academia, and government; and panel discussions on privacy and standards. In addition, this year, TRUST was co-located with four workshops: Trust in Cloud, Hardware Security, Emerging and Future Risks, and Anonymous Signatures. We would like to thank numerous individuals for their e?ort and contri- tion to the conference and for making TRUST 2010 possible: the Organizing Committee members—Nadine Palacios and Marcel Winandy—for their trem- dous help with all aspects of the organization;the Technicaland Socio-economic Program Committee members, whose names are listed on the following pages, together with the names of external reviewers who helped us in the process of selecting manuscripts to be included in the conference proceedings; the keynote and invited speakers; and the invited panel speakers.

Editors and Affiliations

  • Heinz College, Carnegie Mellon University, Pittsburgh, USA

    Alessandro Acquisti

  • Department of Computer Science, 6211 Sudikoff Laboratory, Dartmouth College, Hanover, USA

    Sean W. Smith

  • System Security Lab, Ruhr University Bochum, Bochum, Germany

    Ahmad-Reza Sadeghi

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access