Trust and Trustworthy Computing

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

[1]  Hai Jin,et al.  Innovations for Grid Security from Trusted Computing , 2009, Security Protocols Workshop.

[2]  Peng Ning,et al.  SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms , 2011, CCS '11.

[3]  Stefan Berger,et al.  Building a MAC-based security architecture for the Xen open-source hypervisor , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[4]  Trent Jaeger,et al.  Seeding clouds with trust anchors , 2010, CCSW '10.

[5]  J. Gabriel The Defense , 2013 .

[6]  Zhi Wang,et al.  Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring , 2011, CCS '11.

[7]  Johannes Winter,et al.  Trusted computing building blocks for embedded linux-based ARM trustzone platforms , 2008, STC '08.

[8]  Daniel M. Hein,et al.  A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices , 2010, J. Univers. Comput. Sci..

[9]  Adrian Perrig,et al.  TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.

[10]  Trent Jaeger,et al.  Establishing and Sustaining System Integrity via Root of Trust Installation , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[11]  Trent Jaeger,et al.  Justifying Integrity Using a Virtual Machine Verifier , 2009, 2009 Annual Computer Security Applications Conference.

[12]  Peter Lipp,et al.  A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing , 2007, TGC.

[13]  Dhananjay S. Phatak,et al.  Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing , 2010, TRUST.

[14]  Michael Gissing,et al.  acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity , 2010, INTRUST.

[15]  Johannes Winter,et al.  Lightweight Distributed Attestation for the Cloud , 2012, CLOSER.

[16]  Martin Pirker,et al.  A PrivacyCA for Anonymity and Trust , 2009, TRUST.

[17]  Jean-Pierre Seifert,et al.  A trusted mobile phone reference architecturevia secure kernel , 2007, STC '07.

[18]  Andrew P. Martin,et al.  myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment , 2011, CloudCom.

[19]  Stefan Berger,et al.  Shamon: A System for Distributed Mandatory Access Control , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[20]  Andrew P. Martin,et al.  Towards a secure, tamper-proof grid platform , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).

[21]  Siegfried Podesser,et al.  A Software Architecture for Introducing Trust in Java-Based Clouds , 2011, STA.

[22]  David Lie,et al.  Splitting interfaces: making trust between applications and operating systems configurable , 2006, OSDI '06.

[23]  Daniele Catteddu and Giles Hogben Cloud Computing. Benefits, risks and recommendations for information security , 2009 .

[24]  Michael Gissing,et al.  Dynamic Enforcement of Platform Integrity , 2010, TRUST.

[25]  Thomas Friese,et al.  Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques , 2006, J. Parallel Distributed Comput..

[26]  Michael K. Reiter,et al.  Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.

[27]  Stefan Katzenbeisser,et al.  Improving the scalability of platform attestation , 2008, STC '08.

[28]  David Grawrock,et al.  Dynamics of a trusted platform: a building block approach , 2009 .

[29]  Ahmad-Reza Sadeghi,et al.  Enhancing Grid Security Using Trusted Virtualization , 2007, ATC.

[30]  Jeffrey S. Chase,et al.  Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications , 2011, CCSW '11.

[31]  Angelos Stavrou,et al.  Exploiting smart-phone USB connectivity for fun and profit , 2010, ACSAC '10.

[32]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[33]  Martin Pirker,et al.  Towards Trust Services for Language-Based Virtual Machines for Grid Computing , 2008, TRUST.

[34]  Weiqing Sun,et al.  Practical Proactive Integrity Preservation: A Basis for Malware Defense , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[35]  Udo Steinberg,et al.  NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.

[36]  Gerhard Jentzsch,et al.  Working group on , 1991 .

[37]  Wayne Salamon,et al.  Implementing SELinux as a Linux Security Module , 2003 .

[38]  Sean W. Smith Outbound authentication for programmable secure coprocessors , 2004, International Journal of Information Security.

[39]  Johannes Winter,et al.  A Hijacker's Guide to the LPC Bus , 2011, EuroPKI.

[40]  Stefan Berger,et al.  TVDc: managing security in the trusted virtual datacenter , 2008, OPSR.