000 | 03711nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-642-35795-4 | ||
003 | DE-He213 | ||
005 | 20200421112044.0 | ||
007 | cr nn 008mamaa | ||
008 | 130107s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642357954 _9978-3-642-35795-4 |
||
024 | 7 |
_a10.1007/978-3-642-35795-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aTrustworthy Computing and Services _h[electronic resource] : _bInternational Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers / _cedited by Yuyu Yuan, Xu Wu, Yueming Lu. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aXVIII, 739 p. 301 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v320 |
|
505 | 0 | _aArchitecture for trusted computing systems -- Trusted computing platform -- Trusted systems build -- Network and protocol security -- Mobile network security -- Network survivability and other critical theories and standard systems -- Credible assessment, credible measurement and metrics -- Trusted systems -- Trusted networks -- Trusted mobile network -- Trusted routing -- Trusted software -- Trusted operating systems -- Trusted storage -- Fault-tolerant computing and other key technologies -- Trusted e-commerce and e-government -- Trusted logistics -- Trusted internet of things -- Trusted cloud and other trusted services and applications. | |
520 | _aThis book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aDatabase management. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aDatabase Management. |
700 | 1 |
_aYuan, Yuyu. _eeditor. |
|
700 | 1 |
_aWu, Xu. _eeditor. |
|
700 | 1 |
_aLu, Yueming. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642357947 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v320 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-35795-4 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c56834 _d56834 |