Skip to main content
  • Conference proceedings
  • © 2013

Trustworthy Computing and Services

International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers

  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report

Conference proceedings info: ISCTCS 2012.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (92 papers)

  1. Dynamic Task Scheduling in Cloud Computing Based on Greedy Strategy

    • Liang Ma, Yueming Lu, Fangwei Zhang, Songlin Sun
    Pages 156-162
  2. A Multi-modal Clustering Method for Web Videos

    • Haiqi Huang, Yueming Lu, Fangwei Zhang, Songlin Sun
    Pages 163-169
  3. Incorporate Spatial Information into pLSA for Scene Classification

    • Fei Huang, Xiaojun Jing, Songlin Sun, Yueming Lu
    Pages 170-177
  4. A Trust-Based Data Backup Method on the Cloud

    • Mingtao Lei, Wenbin Yao, Cong Wang
    Pages 178-185
  5. An Implementation of Trusted Remote Attestation Oriented the IaaSCloud

    • Chunwen Li, Xu Wu, Chuanyi Liu, Xiaqing Xie
    Pages 194-202
  6. C-SURF: Colored Speeded Up Robust Features

    • Jing Fu, Xiaojun Jing, Songlin Sun, Yueming Lu, Ying Wang
    Pages 203-210
  7. Mining Explainable User Interests from Scalable User Behavior Data

    • Li Jun, Zuo Xin-qiang, Zhou Meng-qi, Fan Gong-yuan, Li Lian-cun
    Pages 211-218
  8. An Improved Design of the Trustworthiness Authentication Mechanism of IaaS

    • Xu Wu, Xiaqing Xie, Chuanyi Liu, Chunwen Li
    Pages 219-226
  9. Research on Simulation and Real-Time Evaluation Method of IoT-Oriented Complex System

    • Jin-Cui Yang, Bin-Xing Fang, Yu-Yu Yuan, Meng-Xiao Zhai
    Pages 227-235
  10. A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks

    • Tianle Zhang, Yuyu Yuan, Jørgen Bøegh, Xu Wu
    Pages 236-241
  11. A Pervasive Technology Approach to Social Trustworthiness

    • Wang Hongqi, Zongwei Luo, Tianle Zhang, Yuyu Yuan, Xu Wu
    Pages 242-249
  12. Policy-Based De-duplication in Secure Cloud Storage

    • Chuanyi Liu, Xiaojian Liu, Lei Wan
    Pages 250-262
  13. A New Method Based on Fuzzy C-Means Algorithm for Search Results Clustering

    • Fei Wang, Yueming Lu, Fangwei Zhang, Songlin Sun
    Pages 263-270
  14. A Distance Adaptive Embedding Method in Dimension Reduction

    • Yanting Niu, Yueming Lu, Fangwei Zhang, Songlin Sun
    Pages 271-278
  15. Joint Cognitive Access and Power Control in Two-Tie Femtocell Networks

    • Xiaolong Zhao, Tiejun Lv, Yanhui Ma, Yueming Lu
    Pages 279-286
  16. A Flexible Framework for Representations of Entities in the Internet of Things

    • Yu Haining, Zhang Hongli, Yu Xingzhan
    Pages 295-302
  17. Community Detection Based on Robust Label Propagation Algorithm

    • Bingying Xu, Zheng Liang, Yan Jia, Bin Zhou
    Pages 303-310

Other Volumes

  1. Trustworthy Computing and Services

About this book

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.

Editors and Affiliations

  • Beijing University of Posts and Telecommunications, Beijing, China

    Yuyu Yuan, Xu Wu

  • The School of Telecommunications Engineering, Beijing University of Posts and Telecommunications Beijing, Beijing, China

    Yueming Lu

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access