Trustworthy Computing and Services

International Conference, ISCTCS 2012, Beijing, China, May 28 – June 2, 2012, Revised Selected Papers


ISBN: 978-3-642-35794-7 (Print) 978-3-642-35795-4 (Online)

Table of contents (92 chapters)

previous Page of 5
  1. Front Matter

    Pages -

  2. Chapter

    Pages 1-12

    Software Trustworthiness: Past, Present and Future

  3. Chapter

    Pages 13-19

    A New Measurement Method for Software Trustworthiness Based on Rough Sets

  4. Chapter

    Pages 20-25

    Service Behavior Trustworthiness Management

  5. Chapter

    Pages 26-33

    Research on Identifying Method of Covert Channels in Database System

  6. Chapter

    Pages 34-44

    Software Testing is Necessary But Not Sufficient for Software Trustworthiness

  7. Chapter

    Pages 45-51

    A Measurement Model for Trustworthiness of Information System Based on Third-Party Testing Data

  8. Chapter

    Pages 52-59

    Overview of Monitor Selection in Computer Networks

  9. Chapter

    Pages 60-68

    Verification of Requirement Analysis Method for System Based on ISO/IEC 9126 Six Quality Characteristics

  10. Chapter

    Pages 69-77

    A Trustworthy Storage Framework on the Cloud

  11. Chapter

    Pages 78-86

    Progress in Study of Encrypted Traffic Classification

  12. Chapter

    Pages 87-93

    Trustworthiness: From a Social Phenomenon to Internet Technology

  13. Chapter

    Pages 94-101

    Introduction of Quality Requirement and Evaluation Based on ISO/IEC SQuaRE Series of Standard

  14. Chapter

    Pages 102-108

    A Survey on the Security of Multihop Ad Hoc Network

  15. Chapter

    Pages 109-116

    Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption

  16. Chapter

    Pages 117-123

    The Measurement and Analysis of KAD Network

  17. Chapter

    Pages 124-131

    Encrypted Traffic Classification Based on an Improved Clustering Algorithm

  18. Chapter

    Pages 132-139

    Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association

  19. Chapter

    Pages 140-147

    Security and Trust Model for Data Disaster-Recovery Service on the Cloud

  20. Chapter

    Pages 148-155

    Towards Analyzing Traceability of Data Leakage by Malicious Insiders

  21. Chapter

    Pages 156-162

    Dynamic Task Scheduling in Cloud Computing Based on Greedy Strategy

previous Page of 5