LEADER 04413nam 22007095 450 001 9910299242803321 005 20220218190740.0 010 $a3-662-47401-8 024 7 $a10.1007/978-3-662-47401-3 035 $a(CKB)3710000000437001 035 $a(SSID)ssj0001558354 035 $a(PQKBManifestationID)16183736 035 $a(PQKBTitleCode)TC0001558354 035 $a(PQKBWorkID)14819182 035 $a(PQKB)11384053 035 $a(DE-He213)978-3-662-47401-3 035 $a(MiAaPQ)EBC5594948 035 $a(PPN)18640087X 035 $a(EXLCZ)993710000000437001 100 $a20150619d2015 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrustworthy Computing and Services$b[electronic resource] $eInternational Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers /$fedited by Lu Yueming, Wu Xu, Zhang Xi 205 $a1st ed. 2015. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2015. 215 $a1 online resource (XII, 414 p. 206 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0929 ;$v520 300 $aBibliographic Level Mode of Issuance: Monograph 311 0 $a3-662-47400-X 327 $aArchitecture for trusted computing systems -- Trusted computing platform -- Trusted system building; network and protocol security -- Mobile network security -- Network survivability, other critical theories and standard systems -- Credible assessment -- Credible measurement and metrics -- Trusted systems -- Trusted networks -- Trusted mobile networks -- Trusted routing -- Trusted software -- Trusted operating systems -- Trusted storage -- Fault-tolerant computing and other key technologies -- Trusted e-commerce and e-government -- Trusted logistics -- Trusted internet of things -- Trusted cloud and other trusted services and applications. 330 $aThis book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications. 410 0$aCommunications in Computer and Information Science,$x1865-0929 ;$v520 606 $aArchitecture, Computer 606 $aComputer security 606 $aComputer system failures 606 $aComputer software$xReusability 606 $aComputer System Implementation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13057 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 606 $aPerformance and Reliability$3https://scigraph.springernature.com/ontologies/product-market-codes/I12077 615 0$aArchitecture, Computer. 615 0$aComputer security. 615 0$aComputer system failures. 615 0$aComputer software$xReusability. 615 14$aComputer System Implementation. 615 24$aSystems and Data Security. 615 24$aSystem Performance and Evaluation. 615 24$aPerformance and Reliability. 676 $a004.071 702 $aYueming$b Lu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXu$b Wu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXi$b Zhang$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299242803321 996 $aTrustworthy Computing and Services$92088441 997 $aUNINA