Narrow your search

Library

KU Leuven (3)

Vlerick Business School (2)

AP (1)

KBC (1)

KDG (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

More...

Resource type

book (4)

digital (1)


Language

English (5)


Year
From To Submit

2022 (1)

2014 (1)

2013 (2)

2010 (1)

Listing 1 - 5 of 5
Sort by

Book
Trust and Trustworthy Computing : 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings
Authors: --- --- --- ---
ISBN: 3642389074 3642389082 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.

Keywords

Computer science. --- Computer Communication Networks. --- Data encryption (Computer science). --- Computer software. --- Information Systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Engineering & Applied Sciences --- Computer Science --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Informatics --- Computer communication systems. --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer security --- Computer software --- Validation --- Computer systems --- Cryptology. --- Science --- Cryptography --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Communication systems --- Distributed processing --- Data encryption (Computer science) --- Computer networks.


Digital
Trust and Trustworthy Computing : 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings
Authors: --- --- --- ---
ISBN: 9783642389085 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.


Book
Hardware Platform Security for Mobile Devices.
Authors: --- --- --- --- --- et al.
ISBN: 1680839772 Year: 2022 Publisher: Norwell, MA : Now Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As the mobile platforms which enable device use gradually opened, platform security mechanisms were incorporated into their architectures so that the security and privacy requirements could be met. The intent of this monograph is to summarize current and future hardware platform security in mobile devices.


Book
Mobile Platform Security
Authors: --- --- --- --- --- et al.
ISBN: 3031023412 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners.


Book
Proceedings of the fifth ACM Workshop on Scalable Trusted Computing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Listing 1 - 5 of 5
Sort by