This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.
"synopsis" may belong to another edition of this title.
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9783642145964
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 262 pages. 9.00x6.00x0.50 inches. In Stock. Seller Inventory # x-3642145965
Quantity: 2 available
Seller: moluna, Greven, Germany
Condition: New. Up-to-date resultsFast track conference proceedingsState-of-the-art reportThis volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international . Seller Inventory # 5050562
Quantity: 3 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Neuware - This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. Seller Inventory # 9783642145964
Quantity: 2 available
Seller: Buchpark, Trebbin, Germany
Condition: Sehr gut. Zustand: Sehr gut | Seiten: 262 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar. Seller Inventory # 8305614/12
Quantity: 1 available