{"title":"Revocation of Direct Anonymous Attestation","authors":"Liqun Chen, Jiangtao Li","doi":"10.1007/978-3-642-25283-9_9","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_9","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116841435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity","authors":"Ronald Toegl, Martin Pirker, Michael Gissing","doi":"10.1007/978-3-642-25283-9_22","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_22","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128934238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing","authors":"Yanjiang Yang, Liang Gu, F. Bao","doi":"10.1007/978-3-642-25283-9_13","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_13","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131103250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trusted Subjects Configuration Based on TE Model in MLS Systems","authors":"Shangjie Li, Yeping He","doi":"10.1007/978-3-642-25283-9_7","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_7","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116005388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Abstract Model of a Trusted Platform","authors":"Cornelius Namiluko, Andrew P. Martin","doi":"10.1007/978-3-642-25283-9_4","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_4","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Document Access Control Model Based on Role and Security Policy","authors":"Liangjian Mao, Shuzhen Yao, Kai Zhang, K. Sakurai","doi":"10.1007/978-3-642-25283-9_2","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_2","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117098269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sven Bugiel, A. Dmitrienko, Kari Kostiainen, A. Sadeghi, M. Winandy
{"title":"TruWalletM: Secure Web Authentication on Mobile Platforms","authors":"Sven Bugiel, A. Dmitrienko, Kari Kostiainen, A. Sadeghi, M. Winandy","doi":"10.1007/978-3-642-25283-9_15","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_15","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124624775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure Software","authors":"C. Wright","doi":"10.1007/978-3-642-25283-9_23","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_23","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122342345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Emerging Threat: Eve Meets a Robot - (Work-in-Progress)","authors":"K. Akdemir, Deniz Karakoyunlu, T. Padır, B. Sunar","doi":"10.1007/978-3-642-25283-9_18","DOIUrl":"https://doi.org/10.1007/978-3-642-25283-9_18","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130732804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}