Amazon cover image
Image from Amazon.com

Trusted systems : 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013 : proceedings / Roderick Bloem, Peter Lipp (eds.).

By: (5th : INTRUST (Conference) (5th : 2013 : Graz, Austria)Contributor(s): Bloem, Roderick P [editor.] | Lipp, Peter [editor.]Material type: TextTextSeries: Serienbezeichnung | LNCS sublibrary. SL 4, Security and cryptology. | Lecture notes in computer science ; 8292.Publisher: Berlin : Springer, [2013]Copyright date: ©2013Description: 1 online resource (viii, 102 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783319034911; 331903491XOther title: INTRUST 2013Subject(s): Computer security -- Congresses | Computer networks -- Security measures -- Congresses | Data encryption (Computer science) -- Congresses | Computer networks -- Security measures | Computer security | Data encryption (Computer science) | Engineering & Applied Sciences | Computer Science | computerwetenschappen | computer sciences | operating systems | gegevensbeheer | data management | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Ebook. | Conference papers and proceedings. Additional physical formats: Print version:: Trusted systems.DDC classification: 005.8 LOC classification: QA76.9.A25 | I595 2013Online resources: Click here to access online
Contents:
Hardware-Based Security and Applications -- Para-Virtualizing the Trusted Platform Module: An Enterprise -- Framework Based on Version 2.0 Specification -- The PACE.
Summary: This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and author index.

Print version record.

This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.

Hardware-Based Security and Applications -- Para-Virtualizing the Trusted Platform Module: An Enterprise -- Framework Based on Version 2.0 Specification -- The PACE.

Powered by Koha