LEADER 04552nam 22008775 450 001 9910484320003321 005 20251226203557.0 010 $a3-642-00587-X 024 7 $a10.1007/978-3-642-00587-9 035 $a(CKB)1000000000714679 035 $a(SSID)ssj0000320517 035 $a(PQKBManifestationID)11215104 035 $a(PQKBTitleCode)TC0000320517 035 $a(PQKBWorkID)10249239 035 $a(PQKB)10990948 035 $a(DE-He213)978-3-642-00587-9 035 $a(MiAaPQ)EBC3063945 035 $a(PPN)132875012 035 $a(EXLCZ)991000000000714679 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrusted Computing $eSecond International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings /$fedited by Liqun Chen, Chris J. Mitchell, Andrew Martin 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (X, 265 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5471 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-00586-1 320 $aIncludes bibliographical references and index. 327 $aImplementation of Trusted Computing -- Towards a Programmable TPM -- ACPI: Design Principles and Concerns -- Implementation Aspects of Mobile and Embedded Trusted Computing -- Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels -- Attestation -- Remote Attestation of Attribute Updates and Information Flows in a UCON System -- Measuring Semantic Integrity for Remote Attestation -- PKI for Trusted Computing -- A PrivacyCA for Anonymity and Trust -- Revocation of TPM Keys -- Applications I -- Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture -- Trustable Remote Verification of Web Services -- Trustworthy Log Reconciliation for Distributed Virtual Organisations -- Attacking the BitLocker Boot Process -- Applications II -- Secure VPNs for Trusted Computing Environments -- Merx: Secure and Privacy Preserving Delegated Payments -- A Property-Dependent Agent Transfer Protocol. 330 $aThis book constitutes the refereed proceedings of the Second International Conference on Trusted Computing, TRUST 2009, held in Oxford, UK, in April 2009. The 15 revised full papers presented were carefully selected during two rounds of reviewing and improvement from an initial total of 33 submissions. The papers cover the core issues of trust in IT systems and present current research, devoted to technical aspects of trusted computing. The papers are organized in topical sections on implementation of trusted computing, attestation, PKI for trusted computing, applications. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5471 606 $aData protection 606 $aComputer networks 606 $aSoftware engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aApplication software 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aSoftware Engineering 606 $aCryptology 606 $aComputer and Information Systems Applications 606 $aUser Interfaces and Human Computer Interaction 615 0$aData protection. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aUser interfaces (Computer systems). 615 0$aHuman-computer interaction. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aCryptology. 615 24$aComputer and Information Systems Applications. 615 24$aUser Interfaces and Human Computer Interaction. 676 $a005.8 701 $aChen$b Liqun$0720720 701 $aMitchell$b Chris$01753900 701 $aMartin$b Andrew$0382493 712 12$aInternational Conference on Trusted Computing and Trust in Information Technologies. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484320003321 996 $aTrusted computing$94189964 997 $aUNINA