↓ Skip to main content

Trust and Trustworthy Computing

Overview of attention for book
Cover of 'Trust and Trustworthy Computing'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 DAA-Related APIs in TPM 2.0 Revisited
  3. Altmetric Badge
    Chapter 2 Continuous Tamper-Proof Logging Using TPM 2.0
  4. Altmetric Badge
    Chapter 3 Affordable Separation on Embedded Platforms
  5. Altmetric Badge
    Chapter 4 Owner-Centric Protection of Unstructured Data on Smartphones
  6. Altmetric Badge
    Chapter 5 On Usable Location Privacy for Android with Crowd-Recommendations
  7. Altmetric Badge
    Chapter 6 Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs
  8. Altmetric Badge
    Chapter 7 Evaluation of Bistable Ring PUFs Using Single Layer Neural Networks
  9. Altmetric Badge
    Chapter 8 Large-Scale Security Analysis of the Web: Challenges and Findings
  10. Altmetric Badge
    Chapter 9 Towards a Vulnerability Tree Security Evaluation of OpenStack’s Logical Architecture
  11. Altmetric Badge
    Chapter 10 PrivLoc: Preventing Location Tracking in Geofencing Services
  12. Altmetric Badge
    Chapter 11 Hiding Transaction Amounts and Balances in Bitcoin
  13. Altmetric Badge
    Chapter 12 Integration of Data-Minimising Authentication into Authorisation Systems
  14. Altmetric Badge
    Chapter 13 Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant
  15. Altmetric Badge
    Chapter 14 Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems
  16. Altmetric Badge
    Chapter 15 Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents
  17. Altmetric Badge
    Chapter 16 Authentication System Using Encrypted Discrete Biometrics Data
  18. Altmetric Badge
    Chapter 17 On the Development of Automated Forensic Analysis Methods for Mobile Devices
  19. Altmetric Badge
    Chapter 18 A Trusted Knowledge Management System for Multi-layer Threat Analysis
  20. Altmetric Badge
    Chapter 19 Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive Dimensions
  21. Altmetric Badge
    Chapter 20 TRACER: A Platform for Securing Legacy Code
  22. Altmetric Badge
    Chapter 21 Facilitating Trust on Data through Provenance
  23. Altmetric Badge
    Chapter 22 Early Warning Intrusion Detection System
Attention for Chapter 13: Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant
Altmetric Badge

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant
Chapter number 13
Book title
Trust and Trustworthy Computing
Published by
Springer, Cham, June 2014
DOI 10.1007/978-3-319-08593-7_13
Book ISBNs
978-3-31-908592-0, 978-3-31-908593-7
Authors

Vinh Bui, Richard Verhoeven, Johan Lukkien

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 75%
Other 1 25%
Readers by discipline Count As %
Computer Science 3 75%
Engineering 1 25%