Trusted Systems Third International Conference, INTRUST 2011, Beijin

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 s

  • PDF / 9,841,997 Bytes
  • 362 Pages / 429.442 x 659.895 pts Page_size
  • 2 Downloads / 177 Views

DOWNLOAD

REPORT


Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany

7222

Liqun Chen Moti Yung Liehuang Zhu (Eds.)

Trusted Systems Third International Conference INTRUST 2011 Beijing, China, November 27-29, 2011 Revised Selected Papers

13

Volume Editors Liqun Chen Hewlett-Packard Laboratories Long Down Avenue, Stoke Gifford Bristol, BS34 8QZ Bristol, UK E-mail: [email protected] Moti Yung Columbia University Computer Science Department S.W. Mudd Building New York, NY 10027, USA E-mail: [email protected] Liehuang Zhu Beijing Institute of Technology Beijing Key Lab of Intelligent Information Technology 100081 Beijing, China E-mail: [email protected]

ISSN 0302-9743 ISBN 978-3-642-32297-6 DOI 10.1007/978-3-642-32298-3

e-ISSN 1611-3349 e-ISBN 978-3-642-32298-3

Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2012943158 CR Subject Classification (1998): D.4.6, E.3, K.6.5, C.2, K.4.4, J.1, H.4 LNCS Sublibrary: SL 4 – Security and Cryptology

© Springer-Verlag Berlin Heidelberg 2012 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface

These proceedings contains the 21 papers presented at the INTRUST 2011 conference, held in Beijing, China, in November 2011. INTRUST 2011 was the third international conference on the theory, technologies,