International Conference on Trusted Systems最新文献

筛选
英文 中文
Revocation of Direct Anonymous Attestation 直接匿名认证的撤销
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_9
Liqun Chen, Jiangtao Li
{"title":"Revocation of Direct Anonymous Attestation","authors":"Liqun Chen, Jiangtao Li","doi":"10.1007/978-3-642-25283-9_9","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_9","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116841435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity acTvSM:应用程序完整性强制的动态虚拟化平台
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_22
Ronald Toegl, Martin Pirker, Michael Gissing
{"title":"acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity","authors":"Ronald Toegl, Martin Pirker, Michael Gissing","doi":"10.1007/978-3-642-25283-9_22","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_22","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128934238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing 利用可信计算解决代理重加密中重加密密钥泄露问题
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_13
Yanjiang Yang, Liang Gu, F. Bao
{"title":"Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing","authors":"Yanjiang Yang, Liang Gu, F. Bao","doi":"10.1007/978-3-642-25283-9_13","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_13","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131103250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Trusted Subjects Configuration Based on TE Model in MLS Systems 基于TE模型的MLS系统可信主体配置
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_7
Shangjie Li, Yeping He
{"title":"Trusted Subjects Configuration Based on TE Model in MLS Systems","authors":"Shangjie Li, Yeping He","doi":"10.1007/978-3-642-25283-9_7","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_7","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116005388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Abstract Model of a Trusted Platform 可信平台的抽象模型
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_4
Cornelius Namiluko, Andrew P. Martin
{"title":"An Abstract Model of a Trusted Platform","authors":"Cornelius Namiluko, Andrew P. Martin","doi":"10.1007/978-3-642-25283-9_4","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_4","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of Document Access Control Model Based on Role and Security Policy 基于角色和安全策略的文档访问控制模型的设计与实现
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_2
Liangjian Mao, Shuzhen Yao, Kai Zhang, K. Sakurai
{"title":"Design and Implementation of Document Access Control Model Based on Role and Security Policy","authors":"Liangjian Mao, Shuzhen Yao, Kai Zhang, K. Sakurai","doi":"10.1007/978-3-642-25283-9_2","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_2","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117098269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information Flow Graph: An Approach to Identifying Covert Storage Channels 信息流图:一种识别隐蔽存储通道的方法
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_6
Xiangmei Song, Shiguang Ju, Chang-da Wang, Conghua Zhou
{"title":"Information Flow Graph: An Approach to Identifying Covert Storage Channels","authors":"Xiangmei Song, Shiguang Ju, Chang-da Wang, Conghua Zhou","doi":"10.1007/978-3-642-25283-9_6","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_6","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124407668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TruWalletM: Secure Web Authentication on Mobile Platforms TruWalletM:移动平台上的安全Web认证
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_15
Sven Bugiel, A. Dmitrienko, Kari Kostiainen, A. Sadeghi, M. Winandy
{"title":"TruWalletM: Secure Web Authentication on Mobile Platforms","authors":"Sven Bugiel, A. Dmitrienko, Kari Kostiainen, A. Sadeghi, M. Winandy","doi":"10.1007/978-3-642-25283-9_15","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_15","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124624775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure Software 软件、供应商和声誉:创建安全软件的困境分析
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_23
C. Wright
{"title":"Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure Software","authors":"C. Wright","doi":"10.1007/978-3-642-25283-9_23","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_23","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122342345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Emerging Threat: Eve Meets a Robot - (Work-in-Progress) 一个新出现的威胁:夏娃遇到了一个机器人(正在进行的工作)
International Conference on Trusted Systems Pub Date : 2010-12-13 DOI: 10.1007/978-3-642-25283-9_18
K. Akdemir, Deniz Karakoyunlu, T. Padır, B. Sunar
{"title":"An Emerging Threat: Eve Meets a Robot - (Work-in-Progress)","authors":"K. Akdemir, Deniz Karakoyunlu, T. Padır, B. Sunar","doi":"10.1007/978-3-642-25283-9_18","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_18","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130732804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信