Cloud Computing and Security

Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II

  • Xingming Sun
  • Han-Chieh Chao
  • Xingang You
  • Elisa Bertino
Conference proceedings ICCCS 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10603)

Also part of the Information Systems and Applications, incl. Internet/Web, and HCI book sub series (LNISA, volume 10603)

Table of contents

  1. Front Matter
    Pages I-XXII
  2. Information Security

    1. Front Matter
      Pages 1-1
    2. Ce Yang, Weiming Zhang, Jiachen Ding, Nenghai Yu
      Pages 16-28
    3. Po-Ching Lin, Yu-Ting Hsu, Ren-Hung Hwang
      Pages 50-61
    4. Miao Du, Yongzhong Li, Qing Lu, Kun Wang
      Pages 62-71
    5. Hao Wang, Zhengquan Xu, Lizhi Xiong, Tao Wang
      Pages 72-85
    6. Zhiniang Peng, Shaohua Tang, Linzhi Jiang
      Pages 86-99
    7. Ming-Ming Wang, Zhi-Guo Qu, Mohamed Elhoseny
      Pages 100-112
    8. Qihui Zhang, Xuexian Hu, Jianghong Wei, Wenfen Liu
      Pages 123-137
    9. Xiang Lin, Juan Xu, Hu Liu, Xuwei Tang, Maomao Fu
      Pages 138-146
    10. Yi Yin, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama, Naohisa Takahashi
      Pages 147-161
    11. Fan Chen, Hongjie He, Tinghuai Ma, Shu Yan
      Pages 162-174
    12. Yanyu Huang, Chuan Fu, Xuan Chen, Hao Guo, Xiaoyu He, Jin Li et al.
      Pages 175-188

Other volumes

  1. Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I
  2. Cloud Computing and Security
    Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II

About these proceedings

Introduction

This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017.

The 116 full papers and 11 short papers of these volumes were carefully  reviewed and selected from 391 submissions. The papers are organized in  topical sections such as: information hiding; cloud computing;  IOT applications; information security; multimedia applications; optimization  and classification.

Keywords

security protocols Web protocol security theory of database rivacy and security digital rights management authentication access control virtualization and security Web application security cloud computing Internet communications tools mobile and wireless security multimedia information systems multimedia and multimodal retrieval image processing documentt managemetn and text processing optimization algorithms machine learning algorithms

Editors and affiliations

  • Xingming Sun
    • 1
  • Han-Chieh Chao
    • 2
  • Xingang You
    • 3
  • Elisa Bertino
    • 4
  1. 1.Nanjing University of Information Science and TechnologyNanjingChina
  2. 2.National Dong Hwa UniversityShoufengTaiwan
  3. 3.China Information Technology Security Evaluation CenterNanjingChina
  4. 4.Department of Computer SciencePurdue UniversityWest LafayetteUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-68542-7
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-68541-0
  • Online ISBN 978-3-319-68542-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Engineering