© 2014

Trustworthy Computing and Services

International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers

  • Yuyu Yuan
  • Xu Wu
  • Yueming Lu
Conference proceedings ISCTCS 2013

Part of the Communications in Computer and Information Science book series (CCIS, volume 426)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Genxian Liu, Xi Zhang, Dongsheng Wang, Zhenyu Liu, Haixia Wang
    Pages 1-8
  3. Zhixiang Tong, Qiankun Zhuang, Qi Guo, Peijun Ma
    Pages 9-21
  4. Yanjun Jiang, Mingshan Lei
    Pages 22-28
  5. Hu Li, Peng Zou, WeiHong Han, Rongze Xia
    Pages 38-45
  6. Yunlong Ren, Yue Li, Fangfang Yuan, Fangjiao Zhang
    Pages 46-53
  7. Peng Wang, Chengwei Zhang, Xuanya Li, Can Zhang
    Pages 54-61
  8. Pingping Liu, Zhihong Tian, Xu Wu, Wei Liu
    Pages 62-69
  9. Gangfu Feng, Chen Zhang, Quan Zhang
    Pages 70-77
  10. Jiao Wang, Yulin Liu, Zhichao Chao, Wei He
    Pages 78-85
  11. Shaopeng Wang, Yuan Zhang, Yan Peng
    Pages 86-92
  12. Yaoyao Guo, Songlin Sun, Xiaojun Jing, Hai Huang, Yueming Lu, Na Chen
    Pages 93-99
  13. Anqi Huang, Chen Zhang, Chaojing Tang
    Pages 100-106
  14. Chen Chen, Qingyun Liu, Hongzhou Sha, Zhou Zhou, Chao Zheng
    Pages 107-114
  15. Wenhao Wang, Chen Zhang, Quan Zhang
    Pages 115-122
  16. Lei Wang, Chenglong Li, QingFeng Tan, XueBin Wang
    Pages 123-129
  17. Ying Zhang, Yongzheng Zhang, Jun Xiao
    Pages 130-137
  18. Shaojie Pei, Lumin Zhang, Aiping Li, Yusha Liu
    Pages 138-145
  19. Xiaohong Shi, Ying Ji, Hui Xie, Yueming Lu
    Pages 146-153

About these proceedings


This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2013, held in Beijing, China, in November 2013. The 49 revised full papers presented were carefully reviewed and selected from 267 papers. The topics covered are trustworthy infrastructure; security, survivability and fault tolerance; standards, evaluation and certification; trustworthiness of services.


Database and storage security Information accountability and usage control Intrusion detection Management and querying of encrypted data Mobile and wireless security Network security Security in hardware Security protocols Security services Social network security and privacy Software and application security Systems security

Editors and affiliations

  • Yuyu Yuan
    • 1
  • Xu Wu
    • 2
  • Yueming Lu
    • 3
  1. 1.Beijing University of Posts and TelecommunicationsBeijingChina
  2. 2.Beijing University of Posts and TelecommunicationsBeijingChina
  3. 3.Beijing University of Posts and TelecommunicationsBeijingChina

Bibliographic information

  • Book Title Trustworthy Computing and Services
  • Book Subtitle International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers
  • Editors Yuyu Yuan
    Xu Wu
    Yueming Lu
  • Series Title Communications in Computer and Information Science
  • Series Abbreviated Title Communic.Comp.Inf.Science
  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-662-43907-4
  • eBook ISBN 978-3-662-43908-1
  • Series ISSN 1865-0929
  • Series E-ISSN 1865-0937
  • Edition Number 1
  • Number of Pages XIV, 408
  • Number of Illustrations 205 b/w illustrations, 0 illustrations in colour
  • Topics Systems and Data Security
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment