Trustworthy Computing and Services

International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers

  • Yuyu Yuan
  • Xu Wu
  • Yueming Lu

Part of the Communications in Computer and Information Science book series (CCIS, volume 426)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Genxian Liu, Xi Zhang, Dongsheng Wang, Zhenyu Liu, Haixia Wang
    Pages 1-8
  3. Zhixiang Tong, Qiankun Zhuang, Qi Guo, Peijun Ma
    Pages 9-21
  4. Yanjun Jiang, Mingshan Lei
    Pages 22-28
  5. Hu Li, Peng Zou, WeiHong Han, Rongze Xia
    Pages 38-45
  6. Yunlong Ren, Yue Li, Fangfang Yuan, Fangjiao Zhang
    Pages 46-53
  7. Peng Wang, Chengwei Zhang, Xuanya Li, Can Zhang
    Pages 54-61
  8. Pingping Liu, Zhihong Tian, Xu Wu, Wei Liu
    Pages 62-69
  9. Gangfu Feng, Chen Zhang, Quan Zhang
    Pages 70-77
  10. Jiao Wang, Yulin Liu, Zhichao Chao, Wei He
    Pages 78-85
  11. Shaopeng Wang, Yuan Zhang, Yan Peng
    Pages 86-92
  12. Yaoyao Guo, Songlin Sun, Xiaojun Jing, Hai Huang, Yueming Lu, Na Chen
    Pages 93-99
  13. Anqi Huang, Chen Zhang, Chaojing Tang
    Pages 100-106
  14. Chen Chen, Qingyun Liu, Hongzhou Sha, Zhou Zhou, Chao Zheng
    Pages 107-114
  15. Wenhao Wang, Chen Zhang, Quan Zhang
    Pages 115-122
  16. Lei Wang, Chenglong Li, QingFeng Tan, XueBin Wang
    Pages 123-129
  17. Ying Zhang, Yongzheng Zhang, Jun Xiao
    Pages 130-137
  18. Shaojie Pei, Lumin Zhang, Aiping Li, Yusha Liu
    Pages 138-145
  19. Xiaohong Shi, Ying Ji, Hui Xie, Yueming Lu
    Pages 146-153

About these proceedings

Introduction

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2013, held in Beijing, China, in November 2013. The 49 revised full papers presented were carefully reviewed and selected from 267 papers. The topics covered are trustworthy infrastructure; security, survivability and fault tolerance; standards, evaluation and certification; trustworthiness of services.

Keywords

Database and storage security Information accountability and usage control Intrusion detection Management and querying of encrypted data Mobile and wireless security Network security Security in hardware Security protocols Security services Social network security and privacy Software and application security Systems security

Editors and affiliations

  • Yuyu Yuan
    • 1
  • Xu Wu
    • 2
  • Yueming Lu
    • 3
  1. 1.Beijing University of Posts and TelecommunicationsBeijingChina
  2. 2.Beijing University of Posts and TelecommunicationsBeijingChina
  3. 3.Beijing University of Posts and TelecommunicationsBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-43908-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-43907-4
  • Online ISBN 978-3-662-43908-1
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • About this book
Industry Sectors
Pharma
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace