μTSS - A Simplified Trusted Software Stack (English)
- New search for: Stuble, C.
- New search for: Zaerin, A.
- New search for: Stuble, C.
- New search for: Zaerin, A.
- New search for: Acquisti, Alessandro
- New search for: Smith, Sean W.
- New search for: Sadeghi, Ahmad-Reza
In:
Trust and trustworthy computing: third international conference on trust and trustworthy computing, TRUST 2010
6101
;
124-140
;
2010
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:μTSS - A Simplified Trusted Software Stack
-
Contributors:Stuble, C. ( author ) / Zaerin, A. ( author ) / Acquisti, Alessandro / Smith, Sean W. / Sadeghi, Ahmad-Reza
-
Conference:3rd, Trust and trustworthy computing: third international conference on trust and trustworthy computing, TRUST 2010
-
Published in:Trust and trustworthy computing: third international conference on trust and trustworthy computing, TRUST 2010 , 6101 ; 124-140LECTURE NOTES IN COMPUTER SCIENCE , 6101 ; 124-140
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2010-01-01
-
Size:17 pages
-
Remarks:Includes bibliographic references and index. TRUST 2010.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android PlatformNauman, M. / Khan, S. / Zhang, X. / Seifert, J.-P. et al. | 2010
- 16
-
SBAP: Software-Based Attestation for PeripheralsLi, Y. / McCune, J.M. / Perrig, A. et al. | 2010
- 30
-
Key Attestation from Trusted Execution EnvironmentsKostiainen, K. / Dmitrienko, A. / Ekberg, J.-E. / Sadeghi, A.-R. / Asokan, N. et al. | 2010
- 47
-
Anonymous Authentication with TLS and DAACesena, E. / Lohr, H. / Ramunno, G. / Sadeghi, A.-R. / Vernizzi, D. et al. | 2010
- 63
-
Group-Based Attestation: Enhancing Privacy and Management in Remote AttestationAlsouri, S. / Dagdelen, O. / Katzenbeisser, S. et al. | 2010
- 78
-
Towards a Trusted Mobile DesktopSelhorst, M. / Stuble, C. / Feldmann, F. / Gnaida, U. et al. | 2010
- 95
-
Application of Trusted Computing in Automation to Prevent Product PiracyLieberknecht, N. et al. | 2010
- 109
-
Lagrangian E-Voting: Verifiability on Demand and Strong PrivacyKrzywiecki, L. / Kutylowski, M. et al. | 2010
- 124
-
μTSS - A Simplified Trusted Software StackStuble, C. / Zaerin, A. et al. | 2010
- 141
-
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized ArchitectureVasudevan, A. / McCune, J.M. / Qu, N. / van Doorn, L. / Perrig, A. et al. | 2010
- 166
-
A DAA Scheme Using Batch Proof and VerificationChen, L. et al. | 2010
- 181
-
A Pairing-Based DAA Scheme Further Reducing TPM ResourcesBrickell, E. / Li, J. et al. | 2010
- 196
-
An Anonymous Attestation Scheme with Optional TraceabilityLi, J. / Rajan, A. et al. | 2010
- 211
-
Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud ComputingKrautheim, F.J. / Phatak, D.S. / Sherman, A.T. et al. | 2010
- 228
-
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy PlatformsBratus, S. / Locasto, M.E. / Schulte, B. et al. | 2010
- 246
-
Escrowed Data and the Digital EnvelopeAbles, K. / Ryan, M.D. et al. | 2010
- 257
-
Engineering Attestable ServicesLyle, J. / Martin, A. et al. | 2010
- 265
-
Dynamic Enforcement of Platform IntegrityPirker, M. / Toegl, R. / Gissing, M. et al. | 2010
- 273
-
An Improved Memory Integrity Protection SchemeHu, Y. / Sunar, B. et al. | 2010
- 282
-
Robust Combiners for Software Hardening (Extended Abstract)Herzberg, A. / Shulman, H. et al. | 2010
- 290
-
The PUF PromiseBusch, H. / Sotakova, M. / Katzenbeisser, S. / Sion, R. et al. | 2010
- 298
-
Privacy Requirements Engineering for Trustworthy e-Government ServicesVrakas, N. / Kalloniatis, C. / Tsohou, A. / Lambrinoudakis, C. et al. | 2010
- 308
-
Can Competitive Insurers Improve Network Security?Shetty, N. / Schwartz, G. / Walrand, J. et al. | 2010
- 323
-
Nudge: Intermediaries' Role in Interdependent Network SecurityGrossklags, J. / Radosavac, S. / Cardenas, A.A. / Chuang, J. et al. | 2010
- 337
-
How the Public Views Strategies Designed to Reduce the Threat of BotnetsRowe, B. / Wood, D. / Reeves, D. et al. | 2010
- 352
-
Axiomatic and Behavioural TrustThomborson, C. et al. | 2010
- 367
-
The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.orgTan, J.-E. et al. | 2010
- 381
-
The Role of Soft Information in Trust Building: Evidence from Online Social LendingPotzsch, S. / Bohme, R. et al. | 2010
- 396
-
Software on the Witness Stand: What Should It Take for Us to Trust It?Bratus, S. / Lembree, A. / Shubina, A. et al. | 2010
- 417
-
Token-Based Cloud Computing: Secure Outsourcing of Data and Arbitrary Computations with Lower LatencySadeghi, A.-R. / Schneider, T. / Winandy, M. et al. | 2010
- 430
-
Oblivious Transfer Based on Physical Unclonable Functions (Extended Abstract)Ruhrmair, U. et al. | 2010