04413nam 22007095 450 991029924280332120220218190740.03-662-47401-810.1007/978-3-662-47401-3(CKB)3710000000437001(SSID)ssj0001558354(PQKBManifestationID)16183736(PQKBTitleCode)TC0001558354(PQKBWorkID)14819182(PQKB)11384053(DE-He213)978-3-662-47401-3(MiAaPQ)EBC5594948(PPN)18640087X(EXLCZ)99371000000043700120150619d2015 u| 0engurnn#008mamaatxtccrTrustworthy Computing and Services[electronic resource] International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers /edited by Lu Yueming, Wu Xu, Zhang Xi1st ed. 2015.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2015.1 online resource (XII, 414 p. 206 illus.)Communications in Computer and Information Science,1865-0929 ;520Bibliographic Level Mode of Issuance: Monograph3-662-47400-X Architecture for trusted computing systems -- Trusted computing platform -- Trusted system building; network and protocol security -- Mobile network security -- Network survivability, other critical theories and standard systems -- Credible assessment -- Credible measurement and metrics -- Trusted systems -- Trusted networks -- Trusted mobile networks -- Trusted routing -- Trusted software -- Trusted operating systems -- Trusted storage -- Fault-tolerant computing and other key technologies -- Trusted e-commerce and e-government -- Trusted logistics -- Trusted internet of things -- Trusted cloud and other trusted services and applications.This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications.Communications in Computer and Information Science,1865-0929 ;520Architecture, ComputerComputer securityComputer system failuresComputer softwareReusabilityComputer System Implementationhttps://scigraph.springernature.com/ontologies/product-market-codes/I13057Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060System Performance and Evaluationhttps://scigraph.springernature.com/ontologies/product-market-codes/I13049Performance and Reliabilityhttps://scigraph.springernature.com/ontologies/product-market-codes/I12077Architecture, Computer.Computer security.Computer system failures.Computer softwareReusability.Computer System Implementation.Systems and Data Security.System Performance and Evaluation.Performance and Reliability.004.071Yueming Luedthttp://id.loc.gov/vocabulary/relators/edtXu Wuedthttp://id.loc.gov/vocabulary/relators/edtXi Zhangedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910299242803321Trustworthy Computing and Services2088441UNINA