Trustworthy Computing and Services

International Conference, ISCTCS 2012, Beijing, China, May 28 – June 2, 2012, Revised Selected Papers

  • Yuyu Yuan
  • Xu Wu
  • Yueming Lu

Part of the Communications in Computer and Information Science book series (CCIS, volume 320)

Table of contents

  1. Front Matter
  2. Mitra Nami, Witold Suryn
    Pages 1-12
  3. Yuyu Yuan, Yangyang Zhang, Jing Liu
    Pages 20-25
  4. Yao Pang, Xiaoxiao Zhang, Luwei Sun, Weimin Ding
    Pages 26-33
  5. Nafei Zhu, Jiaping Zuo, Yue Zhou, Wei Wang
    Pages 52-59
  6. Xiang Yao, Wenbin Yao
    Pages 69-77
  7. Zigang Cao, Shoufeng Cao, Gang Xiong, Li Guo
    Pages 78-86
  8. Kazuhiro Esaki, Motoei Azuma, Toshihiro Komiyama
    Pages 94-101
  9. Yuan De-yu, Liu Tong, Wei Geng-yu, Wang Zhi-zhao
    Pages 102-108
  10. Bing Rao, Zhigang Zhou, Hongli Zhang, Shuofei Tang, Renfu Yao
    Pages 109-116
  11. Dong Wang, Hui He, Jiantao Shi
    Pages 117-123
  12. Meng Zhang, Hongli Zhang, Bo Zhang, Gang Lu
    Pages 124-131
  13. Gang Xiong, Wenting Huang, Yong Zhao, Ming Song, Zhenzhen Li, Li Guo
    Pages 132-139
  14. Zhao Chen, Wenbin Yao, Cong Wang
    Pages 140-147
  15. Xiao Wang, Jinqiao Shi, Li Guo
    Pages 148-155

About these proceedings

Introduction

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.

Keywords

cloud computing computer networks distributed systems information trustworthiness software engineering

Editors and affiliations

  • Yuyu Yuan
    • 1
  • Xu Wu
    • 1
  • Yueming Lu
    • 2
  1. 1.Beijing University of Posts and TelecommunicationsBeijingChina
  2. 2.The School of Telecommunications EngineeringBeijing University of Posts and Telecommunications BeijingBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-35795-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-35794-7
  • Online ISBN 978-3-642-35795-4
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • About this book
Industry Sectors
Pharma
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace