This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …
The first year of developing a new sales territory or establishing new customers is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on products, grab a customer list, start calling for appointments, discover opportunities, and close deals. In fact, almost every sales model out there is based on nothing more than "opportunity" management. But ju…
Despite this reversal of fortunes, during the 1930s—years that witnessed the ascendancy of both Stalin and Hitler—the ILP demonstrated an unswerving commitment to democratic socialist thinking. Drawing extensively on the ILP’s Labour Leader and other contemporary left-wing newspapers, as well as on ILP publications and internal party documents, Bullock examines the debates and ideological…
Paul Kellogg uses the story of Vorkuta as a frame with which to re-assess the Russian Revolution. In particular, he turns to the contributions of Iulii Martov, a contemporary of Lenin, and his analysis of the central role played in the revolution by a temporary class of peasants-in-uniform. Kellogg explores the persistence and creativity of workers’ resistance in even the darkest hours of aut…
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; t…
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust an…
Combining economic, social-psychological and sociological approaches to trust, this book provides a general theoretical framework to causally explain conditional and unconditional trust; it also presents an experimental test of the corresponding integrative model and its predictions. Broadly, it aims at advancing a cognitive turn in trust research by highlighting the importance of (1) an actor…
The same logic also applies to such other currencies as Bitcoin and community currencies. Their recent diffusion has shown that Hayek's idea of denationalization of money and competition between multiple currencies in terms of its qualities, not its quantities sought as in ongoing quantitative easing, become more relevant under current situations. The qualities of money refer not only to stable…