Trustworthy Computing and Services

International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers

  • Lu Yueming
  • Wu Xu
  • Zhang Xi
Conference proceedings ISCTCS 2014

Part of the Communications in Computer and Information Science book series (CCIS, volume 520)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Shuai Zhang, Yueming Lu, Xi Zhang
    Pages 1-7
  3. Yan Shao, Yanbing Liu, Jianlong Tan
    Pages 16-24
  4. Fan Yang, Yue Li, Lidong Zhai
    Pages 33-40
  5. Qian Li, Weiguo Wu, Liang Gao, Lei Wang, Jianhang Huang
    Pages 41-47
  6. Huailiang Peng, Majing Su, Qiong Dai, Jianlong Tan
    Pages 56-64
  7. Qipeng Yao, Chuan Zhou, Linbo Xiang, Yanan Cao, Li Guo
    Pages 65-73
  8. Qiuwen Lu, Zhou Zhou, Hongzhou Sha, Qingyun Liu, Hongcheng Sun
    Pages 74-82
  9. Weiwei Feng, Peng Wang, Chuan Zhou, Yue Hu, Li Guo
    Pages 83-90
  10. Xiaomei Liu, Yong Sun, Liang Fang, Junpeng Liu, Lingjing Yu
    Pages 91-98
  11. Dong Cui, Chuanyi Liu, Meiqi Yang, Jincui Yang
    Pages 99-106
  12. Heng Chen, Xiaoshe Dong
    Pages 107-113
  13. Xu Bai, Lei Jiang, Xinxing Liu, Jianlong Tan
    Pages 114-121
  14. Yan Chen, Yiguo Pu, Xiaojun Chen, Jinqiao Shi, Xiaojie Yu
    Pages 129-136
  15. Yunxue Yang, Shuyuan Jin, Xiaowei He
    Pages 144-151

About these proceedings

Introduction

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications.

Keywords

network security performance evaluation software and application security systems and data security systems reliability

Editors and affiliations

  • Lu Yueming
    • 1
  • Wu Xu
    • 2
  • Zhang Xi
    • 3
  1. 1.Beijing University of Posts and TelecommuncationsBeijingChina
  2. 2.Beijing University of Posts and TelecommunicationsBeijingChina
  3. 3.Beijing University of Posts and TelecommunicationsBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-47401-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-47400-6
  • Online ISBN 978-3-662-47401-3
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • About this book
Industry Sectors
Electronics
Telecommunications