This book constitutes the thoroughly refereed
post-conference proceedings of the 7th International Conference on Trusted
Systems, INTRUST 2015, held in Beijing, China, in December 2015.
The revised 12 full papers presented have been
carefully reviewed and selected from 29 submissions. They are devoted to all
aspects of trusted computing systems, including trusted modules, platforms;
networks, services and applications. The papers are organized in the following
sections: encryptions and signatures; security model; trusted technologies;
software and system security.