1.

Record Nr.

UNINA9910484936803321

Titolo

Trusted Systems : 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers / / edited by Moti Yung, Liehuang Zhu, Yanjiang Yang

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015

ISBN

3-319-27998-X

Edizione

[1st ed. 2015.]

Descrizione fisica

1 online resource (XIII, 442 p. 83 illus. in color.)

Collana

Security and Cryptology ; ; 9473

Disciplina

511.3

Soggetti

Computer security

Data encryption (Computer science)

Operating systems (Computers)

Computer communication systems

Management information systems

Computer science

Computer science—Mathematics

Systems and Data Security

Cryptology

Operating Systems

Computer Communication Networks

Management of Computing and Information Systems

Discrete Mathematics in Computer Science

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di contenuto

Signature and authentication -- Secure protocols and access control -- Cloud security -- cryptographic aspects -- Software security -- Security analysis -- Secure communication and privacy.

Sommario/riassunto

Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with



end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}.