Keyphrases
- international symposium
- trusted computing
- computational intelligence
- revised papers
- security services
- trust management
- trust relationships
- ambient intelligence
- host computer
- trust negotiation
- access control
- public key infrastructure
- physical layer
- cloud computing
- information security
- security policies
- real time
- computing platform
- computing environments
- floating point arithmetic
- lecture notes
- intrusion detection
- computer systems
- artificial intelligence
- book constitutes the refereed proceedings
- carefully reviewed and selected from submissions
- trust model
- data center
- smart card
- multiagent systems
- malicious nodes
- machine learning