Trustworthy Computing and Services (Record no. 56834)

000 -LEADER
fixed length control field 03711nam a22006015i 4500
001 - CONTROL NUMBER
control field 978-3-642-35795-4
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112044.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130107s2013 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783642357954
-- 978-3-642-35795-4
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 10 - TITLE STATEMENT
Title Trustworthy Computing and Services
Sub Title International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XVIII, 739 p. 301 illus.
490 1# - SERIES STATEMENT
Series statement Communications in Computer and Information Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Architecture for trusted computing systems -- Trusted computing platform -- Trusted systems build -- Network and protocol security -- Mobile network security -- Network survivability and other critical theories and standard systems -- Credible assessment, credible measurement and metrics -- Trusted systems -- Trusted networks -- Trusted mobile network -- Trusted routing -- Trusted software -- Trusted operating systems -- Trusted storage -- Fault-tolerant computing and other key technologies -- Trusted e-commerce and e-government -- Trusted logistics -- Trusted internet of things -- Trusted cloud and other trusted services and applications.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.
700 1# - AUTHOR 2
Author 2 Yuan, Yuyu.
700 1# - AUTHOR 2
Author 2 Wu, Xu.
700 1# - AUTHOR 2
Author 2 Lu, Yueming.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-35795-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2013.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Software engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Operating systems (Computers).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Database management.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Software Engineering.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Operating Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Encryption.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Database Management.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1865-0929 ;
912 ## -
-- ZDB-2-SCS

No items available.