![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
5. INTRUST 2013: Graz, Austria
- Roderick Bloem
, Peter Lipp:
Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings. Lecture Notes in Computer Science 8292, Springer 2013, ISBN 978-3-319-03490-4
Session 1: Hardware-Based Security and Applications
- Jiun Yi Yap, Allan Tomlinson:
Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification. 1-16 - Jens Bender, Marc Fischlin, Dennis Kügler:
The PACE|CA Protocol for Machine Readable Travel Documents. 17-35 - Patrick Koeberl, Jiangtao Li, Wei Wu:
A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions. 36-52
Session 2: Access Control, Integrity and Policy Enforcement
- Michael Velten, Sascha Wessel, Frederic Stumpf, Claudia Eckert:
Active File Integrity Monitoring Using Paravirtualized Filesystems. 53-69 - Fabio Martinelli, Ilaria Matteucci
, Andrea Saracino
, Daniele Sgandurra:
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments. 70-84 - Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin
:
Towards Policy Engineering for Attribute-Based Access Control. 85-102
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.