Skip to main content
  • Conference proceedings
  • © 2010

Trusted Systems

First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings

  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6163)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): INTRUST: International Conference on Trusted Systems

Conference proceedings info: INTRUST 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 papers)

  1. Front Matter

  2. Invited Talk

  3. Attestation

    1. Remote Attestation on Function Execution (Work-in-Progress)

      • Liang Gu, Yueqiang Cheng, Xuhua Ding, Robert H. Deng, Yao Guo, Weizhong Shao
      Pages 60-72
    2. Scalable Remote Attestation with Privacy Protection

      • Tamleek Ali Tanveer, Masoom Alam, Mohammad Nauman
      Pages 73-87
  4. Trusted Network

    1. Privacy Enhanced Trusted Network Connect

      • Ingo Bente, Joerg Vieweg, Josef von Helden
      Pages 129-145
  5. Virtualization

    1. Trusted Virtual Domains – Design, Implementation and Lessons Learned

      • Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi et al.
      Pages 156-179
    2. Trusted Integrity Measurement and Reporting for Virtualized Platforms

      • Serdar Cabuk, Liqun Chen, David Plaquin, Mark Ryan
      Pages 180-196
  6. Applications

    1. A Feather-Weight Application Isolation Model

      • Jianhua Liao, Yong Zhao, Changxiang Shen
      Pages 197-211
    2. Exploring Trust of Mobile Applications Based on User Behaviors

      • Zheng Yan, Yan Dong, Valtteri Niemi, Guoliang Yu
      Pages 212-226
    3. Trusted Firmware Services Based on TPM

      • Zhenlong Du, Xiaoli Li, Kangkang Shen
      Pages 227-235
  7. Supporting Technology

    1. Improved Cryptanalysis of the FOX Block Cipher

      • Zhongming Wu, Yiyuan Luo, Xuejia Lai, Bo Zhu
      Pages 236-249
    2. Bitwise Higher Order Differential Cryptanalysis

      • Bo Zhu, Kefei Chen, Xuejia Lai
      Pages 250-262
  8. Back Matter

Other Volumes

  1. Trusted Systems

About this book

This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.

Editors and Affiliations

  • Hewlett Packard Labs, Bristol, UK

    Liqun Chen

  • Computer Science Department, Google Inc. and Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access