default search action
5. INTRUST 2013: Graz, Austria
- Roderick Bloem, Peter Lipp:
Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings. Lecture Notes in Computer Science 8292, Springer 2013, ISBN 978-3-319-03490-4
Session 1: Hardware-Based Security and Applications
- Jiun Yi Yap, Allan Tomlinson:
Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification. 1-16 - Jens Bender, Marc Fischlin, Dennis Kügler:
The PACE|CA Protocol for Machine Readable Travel Documents. 17-35 - Patrick Koeberl, Jiangtao Li, Wei Wu:
A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions. 36-52
Session 2: Access Control, Integrity and Policy Enforcement
- Michael Velten, Sascha Wessel, Frederic Stumpf, Claudia Eckert:
Active File Integrity Monitoring Using Paravirtualized Filesystems. 53-69 - Fabio Martinelli, Ilaria Matteucci, Andrea Saracino, Daniele Sgandurra:
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments. 70-84 - Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin:
Towards Policy Engineering for Attribute-Based Access Control. 85-102
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.