This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.
Author(s): Wenchang Shi (auth.), Liqun Chen, Moti Yung (eds.)
Series: Lecture Notes in Computer Science 6163 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010
Language: English
Pages: 263
Tags: Computer Communication Networks; Data Encryption; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computers and Society; Systems and Data Security
Front Matter....Pages -
On Design of a Trusted Software Base with Support of TPCM....Pages 1-15
External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing....Pages 16-38
A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks....Pages 39-59
Remote Attestation on Function Execution (Work-in-Progress)....Pages 60-72
Scalable Remote Attestation with Privacy Protection....Pages 73-87
Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation....Pages 88-103
SocialClouds: Concept, Security Architecture and Some Mechanisms....Pages 104-128
Privacy Enhanced Trusted Network Connect....Pages 129-145
Research on Multistage Interconnection Architecture and Collision Detection Model....Pages 146-155
Trusted Virtual Domains – Design, Implementation and Lessons Learned....Pages 156-179
Trusted Integrity Measurement and Reporting for Virtualized Platforms....Pages 180-196
A Feather-Weight Application Isolation Model....Pages 197-211
Exploring Trust of Mobile Applications Based on User Behaviors....Pages 212-226
Trusted Firmware Services Based on TPM ....Pages 227-235
Improved Cryptanalysis of the FOX Block Cipher....Pages 236-249
Bitwise Higher Order Differential Cryptanalysis....Pages 250-262
Back Matter....Pages -