|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910299242803321 |
|
|
Titolo |
Trustworthy Computing and Services : International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers / / edited by Lu Yueming, Wu Xu, Zhang Xi |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2015.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 414 p. 206 illus.) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science, , 1865-0929 ; ; 520 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Architecture, Computer |
Computer security |
Computer system failures |
Computer software - Reusability |
Computer System Implementation |
Systems and Data Security |
System Performance and Evaluation |
Performance and Reliability |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di contenuto |
|
Architecture for trusted computing systems -- Trusted computing platform -- Trusted system building; network and protocol security -- Mobile network security -- Network survivability, other critical theories and standard systems -- Credible assessment -- Credible measurement and metrics -- Trusted systems -- Trusted networks -- Trusted mobile networks -- Trusted routing -- Trusted software -- Trusted operating systems -- Trusted storage -- Fault-tolerant computing and other key technologies -- Trusted e-commerce and e-government -- Trusted logistics -- Trusted internet of things -- Trusted cloud and other trusted services and applications. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full |
|
|
|
|
|
|
|
|
|
|
papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications. |
|
|
|
|
|
| |