Trustworthy Computing and Services

International Conference, ISCTCS 2012, Beijing, China, May 28 – June 2, 2012, Revised Selected Papers

  • Yuyu Yuan
  • Xu Wu
  • Yueming Lu
Conference proceedings ISCTCS 2012

DOI: 10.1007/978-3-642-35795-4

Part of the Communications in Computer and Information Science book series (CCIS, volume 320)

Table of contents (92 papers)

  1. Front Matter
  2. Software Trustworthiness: Past, Present and Future
    Mitra Nami, Witold Suryn
    Pages 1-12
  3. Service Behavior Trustworthiness Management
    Yuyu Yuan, Yangyang Zhang, Jing Liu
    Pages 20-25
  4. Research on Identifying Method of Covert Channels in Database System
    Yao Pang, Xiaoxiao Zhang, Luwei Sun, Weimin Ding
    Pages 26-33
  5. Overview of Monitor Selection in Computer Networks
    Nafei Zhu, Jiaping Zuo, Yue Zhou, Wei Wang
    Pages 52-59
  6. A Trustworthy Storage Framework on the Cloud
    Xiang Yao, Wenbin Yao
    Pages 69-77
  7. Progress in Study of Encrypted Traffic Classification
    Zigang Cao, Shoufeng Cao, Gang Xiong, Li Guo
    Pages 78-86
  8. Introduction of Quality Requirement and Evaluation Based on ISO/IEC SQuaRE Series of Standard
    Kazuhiro Esaki, Motoei Azuma, Toshihiro Komiyama
    Pages 94-101
  9. A Survey on the Security of Multihop Ad Hoc Network
    Yuan De-yu, Liu Tong, Wei Geng-yu, Wang Zhi-zhao
    Pages 102-108
  10. Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption
    Bing Rao, Zhigang Zhou, Hongli Zhang, Shuofei Tang, Renfu Yao
    Pages 109-116
  11. The Measurement and Analysis of KAD Network
    Dong Wang, Hui He, Jiantao Shi
    Pages 117-123
  12. Encrypted Traffic Classification Based on an Improved Clustering Algorithm
    Meng Zhang, Hongli Zhang, Bo Zhang, Gang Lu
    Pages 124-131
  13. Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association
    Gang Xiong, Wenting Huang, Yong Zhao, Ming Song, Zhenzhen Li, Li Guo
    Pages 132-139
  14. Security and Trust Model for Data Disaster-Recovery Service on the Cloud
    Zhao Chen, Wenbin Yao, Cong Wang
    Pages 140-147
  15. Towards Analyzing Traceability of Data Leakage by Malicious Insiders
    Xiao Wang, Jinqiao Shi, Li Guo
    Pages 148-155

About these proceedings


This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.


cloud computing computer networks distributed systems information trustworthiness software engineering

Editors and affiliations

  • Yuyu Yuan
    • 1
  • Xu Wu
    • 1
  • Yueming Lu
    • 2
  1. 1.Beijing University of Posts and TelecommunicationsBeijingChina
  2. 2.The School of Telecommunications EngineeringBeijing University of Posts and Telecommunications BeijingBeijingChina

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-35794-7
  • Online ISBN 978-3-642-35795-4
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937