


default search action
5. INTRUST 2013: Graz, Austria
- Roderick Bloem

, Peter Lipp:
Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings. Lecture Notes in Computer Science 8292, Springer 2013, ISBN 978-3-319-03490-4
Session 1: Hardware-Based Security and Applications
- Jiun Yi Yap, Allan Tomlinson:

Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification. 1-16 - Jens Bender, Marc Fischlin, Dennis Kügler:

The PACE|CA Protocol for Machine Readable Travel Documents. 17-35 - Patrick Koeberl, Jiangtao Li, Wei Wu:

A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions. 36-52
Session 2: Access Control, Integrity and Policy Enforcement
- Michael Velten, Sascha Wessel, Frederic Stumpf, Claudia Eckert:

Active File Integrity Monitoring Using Paravirtualized Filesystems. 53-69 - Fabio Martinelli, Ilaria Matteucci

, Andrea Saracino
, Daniele Sgandurra:
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments. 70-84 - Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin

:
Towards Policy Engineering for Attribute-Based Access Control. 85-102

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














