Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings
ISBN-10
9811070806
ISBN-13
9789811070808
Category
Computers
Pages
410
Language
English
Published
2017-11-22
Publisher
Springer
Authors
Ming Xu, Fei Yan, Zheng Qin

Description

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.

Similar books

  • Trusted Computing Platforms: Design and Applications
    By Sean W. Smith

    1.1 Trust and Computing We should probably first begin with some definitions. This book uses the term trusted computing platform (TCP) in its title and throughout the text, because that is the term the community has come to use for this ...

  • A Practical Guide to Trusted Computing
    By David Challener, Kent Yoder, Ryan Catherman

    ... Fiammante, Jones, and Shah ISBN 0131870025 RATIONAL AND SOFTWARE DEVELOPMENT IBM Rational® ClearCase®, Ant, and CruiseControl Lee ISBN 0321356993 IBM® Rational® Unified Process® Reference and Certification Guide Shuja and Krebs ISBN ...

  • Trusted Computing Platforms: TPM2.0 in Context
    By Chris Dalton, Liqun Chen, Graeme Proudler

    In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future.

  • Guide to Understanding Design Documentation in Trusted Systems

    A set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information.

  • Information Assurance and Computer Security
    By J.P. Thomas, M. Essaaidi

    This book provides a discussion on a wide variety of viewpoints on some of the main challenges facing secure systems.

  • Bootstrapping Trust in Modern Computers
    By Bryan Parno, Jonathan M. McCune, Adrian Perrig

    Busch, H., Sot ́akov ́a, M., Katzenbeisser, S., Sion, R.: The PUF promise. In: Proceedings of the International Conference on Trust and Trustworthy Computing (2010) (Referenced on page 39.) Bussani, A., Griffin, J.L., Jansen, B., ...

  • Computers at Risk: Safe Computing in the Information Age
    By Mathematics, National Research Council, Division on Engineering and Physical Sciences

    The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced ...

  • Trusted Computing: Principles and Applications
    By Dengguo Feng

    The book summarizes key concepts and theories in trusted computing, e.g.

  • Guide to Understanding Trusted Distribution in Trusted Systems
    By Scott Wright

    Guide to Understanding Trusted Distribution in Trusted Systems

  • The 'Orange Book' Series
    By Us Department Of Defense

    ' Financial Times The 'Orange Book' Series, produced by the American Department of Defense is as yet the only guide to effective computer security for both military and commercial sectors.