Limit search to available items
Book Cover
E-book
Author ISCTCS (Conference) (2012 : Beijing, China)

Title Trustworthy computing and services : International Conference, ISCTCS 2012, Beijing, China, May 28-June 2, 2012, Revised selected papers / Yuyu Yuan, Xu Wu, Yueming Lu (eds.)
Published Berlin ; New York : Springer, ©2013

Copies

Description 1 online resource
Series Communications in computer and information science, 1865-0929 ; 320
Communications in computer and information science ; 320.
Contents Software Trustworthiness: Past, Present and Future / Mitra Nami, Witold Suryn -- A New Measurement Method for Software Trustworthiness Based on Rough Sets / Yuyu Yuan, Qiang Han, Sun Qi -- Service Behavior Trustworthiness Management / Yuyu Yuan, Yangyang Zhang, Jing Liu -- Research on Identifying Method of Covert Channels in Database System / Yao Pang, Xiaoxiao Zhang, Luwei Sun, Weimin Ding -- Software Testing is Necessary But Not Sufficient for Software Trustworthiness / Mitra Nami, Witold Suryn -- A Measurement Model for Trustworthiness of Information System Based on Third-Party Testing Data / Jiaping Zuo, Pei Ren, Hao Kong -- Overview of Monitor Selection in Computer Networks / Nafei Zhu, Jiaping Zuo, Yue Zhou, Wei Wang -- Verification of Requirement Analysis Method for System Based on ISO/IEC 9126 Six Quality Characteristics / Kazuhiro Esaki -- A Trustworthy Storage Framework on the Cloud / Xiang Yao, Wenbin Yao -- Progress in Study of Encrypted Traffic Classification / Zigang Cao, Shoufeng Cao, Gang Xiong, Li Guo
Trustworthiness: From a Social Phenomenon to Internet Technology / Jørgen Bøegh -- Introduction of Quality Requirement and Evaluation Based on ISO/IEC SQuaRE Series of Standard / Kazuhiro Esaki, Motoei Azuma, Toshihiro Komiyama -- A Survey on the Security of Multihop Ad Hoc Network / Yuan De-yu, Liu Tong, Wei Geng-yu, Wang Zhi-zhao -- Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption / Bing Rao, Zhigang Zhou, Hongli Zhang, Shuofei Tang -- The Measurement and Analysis of KAD Network / Dong Wang, Hui He, Jiantao Shi -- Encrypted Traffic Classification Based on an Improved Clustering Algorithm / Meng Zhang, Hongli Zhang, Bo Zhang, Gang Lu -- Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association / Gang Xiong, Wenting Huang, Yong Zhao, Ming Song -- Security and Trust Model for Data Disaster-Recovery Service on the Cloud / Zhao Chen, Wenbin Yao, Cong Wang -- Towards Analyzing Traceability of Data Leakage by Malicious Insiders / Xiao Wang, Jinqiao Shi, Li Guo
Dynamic Task Scheduling in Cloud Computing Based on Greedy Strategy / Liang Ma, Yueming Lu, Fangwei Zhang, Songlin Sun -- A Multi-modal Clustering Method for Web Videos / Haiqi Huang, Yueming Lu, Fangwei Zhang, Songlin Sun -- Incorporate Spatial Information into pLSA for Scene Classification / Fei Huang, Xiaojun Jing, Songlin Sun, Yueming Lu -- A Trust-Based Data Backup Method on the Cloud / Mingtao Lei, Wenbin Yao, Cong Wang -- Active RFID-Based Indoor Localization Algorithm Using Virtual Reference through Bivariate Newton Interpolation / Chenggang Shao, Xiaojun Jing, Songlin Sun, Yueming Lu -- An Implementation of Trusted Remote Attestation Oriented the IaaSCloud / Chunwen Li, Xu Wu, Chuanyi Liu, Xiaqing Xie -- C-SURF: Colored Speeded Up Robust Features / Jing Fu, Xiaojun Jing, Songlin Sun, Yueming Lu -- Mining Explainable User Interests from Scalable User Behavior Data / Li Jun, Zuo Xin-qiang, Zhou Meng-qi, Fan Gong-yuan
An Improved Design of the Trustworthiness Authentication Mechanism of IaaS / Xu Wu, Xiaqing Xie, Chuanyi Liu, Chunwen Li -- Research on Simulation and Real-Time Evaluation Method of IoT-Oriented Complex System / Jin-Cui Yang, Bin-Xing Fang, Yu-Yu Yuan -- A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks / Tianle Zhang, Yuyu Yuan, Jørgen Bøegh, Xu Wu -- A Pervasive Technology Approach to Social Trustworthiness / Wang Hongqi, Zongwei Luo, Tianle Zhang, Yuyu Yuan -- Policy-Based De-duplication in Secure Cloud Storage / Chuanyi Liu, Xiaojian Liu, Lei Wan -- A New Method Based on Fuzzy C-Means Algorithm for Search Results Clustering / Fei Wang, Yueming Lu, Fangwei Zhang, Songlin Sun -- A Distance Adaptive Embedding Method in Dimension Reduction / Yanting Niu, Yueming Lu, Fangwei Zhang, Songlin Sun -- Joint Cognitive Access and Power Control in Two-Tie Femtocell Networks / Xiaolong Zhao, Tiejun Lv, Yanhui Ma, Yueming Lu -- Based on Support Vector and Word Features New Word Discovery Research / Li Chengcheng, Xu Yuanfang
A Flexible Framework for Representations of Entities in the Internet of Things / Yu Haining, Zhang Hongli, Yu Xingzhan -- Community Detection Based on Robust Label Propagation Algorithm / Bingying Xu, Zheng Liang, Yan Jia, Bin Zhou -- Clock Synchronization Algorithm for Distributed Video Surveillance Based on PTP / Liu Xuehai, Tang Jin -- A Low-Complexity Vector Perturbation Precoding Approach Based on Reactive Tabu Search for Large Multiuser MIMO Systems / Wei Ding, Tiejun Lv, Yueming Lu -- A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud Computing / Hongli Zhang, Panpan Li, Zhigang Zhou, Xiangzhan Yu -- Hiding Signatures in Variable Names / Yinjie Su, Jiahui Liu, Dong Li -- Chinese New Words Detection Using Mutual Information / Zheng Liang, Bingying Xu, Jie Zhao, Yan Jia, Bin Zhou -- An Efficient Parallel String Matching Algorithm Based on DFA / Yujian Fan, Hongli Zhang, Jiahui Liu, Dongliang Xu -- A Ciphertext Data Retrieval Method Based on Cloud Storage / Shuo Zheng, Siyang Wang, Cong Wang
A Multi-phase k-anonymity Algorithm Based on Clustering Techniques / Fei Liu, Yan Jia, Weihong Han -- A P2P Reputation Model Based on P2P File-Sharing Behavioral Characteristics / Chao Xin, Hui-jun Han, Xiu-qin Lin, Geng-yu Wei -- Unobservable Rendezvous Negotiation in P2P Networks / Fanwen Xu, Qingfeng Tan, Jinqiao Shi, Li Guo -- A Hierarchical Method for Clustering Binary Text Image / Yiguo Pu, Jinqiao Shi, Li Guo -- Search Results Evaluation Based on User Behavior / Jinxiu Yu, Yueming Lu, Songlin Sun, Fangwei Zhang -- Classification Research on SSL Encrypted Application / Peipei Fu, Li Guo, Gang Xiong, Jiao Meng -- S-URL Flux: A Novel C & C Protocol for Mobile Botnets / Wang Shuai, Cui Xiang, Liao Peng, Li Dan -- An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking Facebook CAPTCHA / Peipeng Liu, Jinqiao Shi, Lihong Wang, Li Guo -- Security and Cost Analyses of DNSSEC Protocol / Yao Yao, Longtao He, Gang Xiong -- An Automatic Approach to Detect Anti-debugging in Malware Analysis / Peidai Xie, Xicheng Lu, Yongjun Wang, Jinshu Su
OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical Characteristics / Yi Pang, Shuyuan Jin, Shicong Li, Jilei Li, Hao Ren -- An Intent-Driven Masquerader Detection Framework Based on Data Fusion / Chen Xiaojun, Shi Jinqiao, Pu Yiguo, Zhang Haoliang -- An Integration of Several Different Data Flow Analysis Techniques / Yuchen Xing, Hanfei Wang, Jianhua Zhao -- Specifying and Detecting Behavioral Changes in Source Code Using Abstract Syntax Tree Differencing / Yuankui Li, Linzhang Wang -- Timing Aspects Construction Using UML-MARTE Profile / Qingqing Sun, Xiaopu Huang, Jiangwei Li, Tian Zhang -- An Overtime-Detection Model-Checking Technique for Interrupt Processing Systems / Xiaoyu Zhou, Jianhua Zhao -- MDE-Based Verification of SysML State Machine Diagram by UPPAAL / Xiaopu Huang, Qingqing Sun, Jiangwei Li, Tian Zhang -- CppIns: A Source Query Language for Instrumentation / Ying He, Yongjing Tao, Tian Zhang -- An UML Model Query Method Based on Structure Pattern Matching / Xuelin Zhang, Huajie Chen, Tian Zhang
A Lightweight Type Enforcement Access Control Approach with Role Based Authorization / Yan Ding, Hongyi Fu, Lifeng Wei, Lianyue He -- Composition of AADL Components by Transformation to Interface Automata / Jiangwei Li, Jizhou Zhao, Qingqing Sun, Xiaopu Huang -- Finding [delta]-Closure Property of BitTorrent System and Applications Based on This Property / Wang Kun, Sha Ying, Tan Jian-long, Guo Li, Li yang -- A Tool to Construct One Comprehensive Legal Environment for Behavioral Incompatible Components / Jizhou Zhao, Jiangwei Li, Yan Zhang, Tian Zhang -- Research of Security Relationship Based on Social Networks / Li Yang, Wang Xiaoyan, Sha Ying, Tan Jian-long -- Vulnerability Evaluating Based on Attack Graph / Chunlu Wang, Yu Bao, Xuesen Liang, Tianle Zhang -- A Dynamic Strategy to Cache Out-of-Sequence Packet in DPI System / Qingyun Liu, Wenzhong Feng, Qiong Dai -- Speeding Up Double-Array Trie Construction for String Matching / Niu Shuai, Liu Yanbing, Song Xinbo -- Modeling of Hierarchical Index System for Network Operation Security / Yongzheng Zhang, Xiaochun Yun
An Evaluation Framework of Coverage-Based Fault Localization for Object-Oriented Programs / Qing Xu, Yu Pei, Linzhang Wang -- Research of New Words Identification in Social Network for Monitoring Public Opinion / Wang Xiaoyan, Xu kai, Sha Ying, Tan Jian-long, Guo Li -- A Novel Dynamic Self-adaptive Framework for Network Security Evaluation / Wu Jinyu, Yin Lihua, Fang Binxing -- Wireless Sensor Network MAC Protocol Used in the City Fire / Xiaoyan Cui, Xiaoshuang Chen, Haitao Zhang -- The Application of Robot Localization and Navigation Based on WSN in the Disaster Relief / Xiaoyan Cui, Xiaoshuang Chen, Wei Shi, Yi Zhang -- Comparison and Performance Analysis of Join Approach in MapReduce / Fuhui Wu, Qingbo Wu, Yusong Tan -- Analysis of Public Sentiment Based on SMS Content / Zhilei Wang, Lidong Zhai, Yongqiang Ma, Yue Li -- Control Method of Twitter- and SMS-Based Mobile Botnet / Yue Li, Lidong Zhai, Zhilei Wang, Yunlong Ren -- A Cache Management Strategy for Transparent Computing Storage System / Yuan Gao, Yaoxue Zhang, Yuezhi Zhou -- Network Security Situation Prediction Based on BP and RBF Neural Network / Yaxing Zhang, Shuyuan Jin, Xiang Cui, Xi Yin, Yi Pang
Research on Redundant Channel Model Based on Spatial Correlation in IOT / Fangjiao Zhang, Wei Guo, Jincui Yang, Fangfang Yuan -- Design of a Trusted File System Based on Hadoop / Songchang Jin, Shuqiang Yang, Xiang Zhu, Hong Yin -- Architecting Dependable Many-Core Processors Using Core-Level Dynamic Redundancy / Wentao Jia, Chunyuan Zhang, Jian Fu, Rui Li -- Study on Transformed Keywords Identification in Spam Filtering / Dapeng Xiong, Zhang Yan, Aiping Li -- Preliminary Study of Enhanced Collaborative Information Extracting and Sharing System / Mingfei Wu, Yi Han, Bin Zhou, Aiping Li -- A Compatible and Graphical Modeling Approach for Earth System Model / Taiping Guo, Zhongzhi Luan -- Who Can Haul the ANDON-CORD in the Software Development Process / Liu Yinglian, Jørgen Bøegh, Sun Qi -- Research and Implement of Security Situation Awareness System YH-SSAS / Weihong Han, Qingguang Wang, Yan Jia -- A Reliable Query Scheme for Outsourced Data in Cloud / Junchao Wu, Panpan Li, Hongli Zhang, Binsheng Chu
Summary This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications
Analysis Computer science
Computer Communication Networks
Software engineering
Data protection
Data encryption (Computer science)
Subject Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks.
Computer security.
Computer Communication Networks
Computer Security
Computer networks
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Yuan, Yuyu.
Wu, Xu
Lu, Yueming.
ISBN 9783642357954
3642357954
Other Titles ISCTCS 2012