Fr. 135.00

Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.

List of contents

Architecture for trusted computing systems.- Trusted computing platform.- Trusted systems build.- Network and protocol security.- Mobile network security.- Network survivability and other critical theories and standard systems.- Credible assessment, credible measurement and metrics.- Trusted systems.- Trusted networks.- Trusted mobile network.- Trusted routing.- Trusted software.- Trusted operating systems.- Trusted storage.- Fault-tolerant computing and other key technologies.- Trusted e-commerce and e-government.- Trusted logistics.- Trusted internet of things.- Trusted cloud and other trusted services and applications.

Summary

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.