International Conference on Cloud Computing and Security

Cloud Computing and Security

First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers

  • Zhiqiu Huang
  • Xingming Sun
  • Junzhou Luo
  • Jian Wang

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9483)

Also part of the Information Systems and Applications, incl. Internet/Web, and HCI book sub series (LNISA, volume 9483)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Data Security

    1. Front Matter
      Pages 1-1
    2. Xuejun Dai, Yuhua Huang, Lu Chen, Tingting Lu, Fei Su
      Pages 3-13
    3. Zhong Ting, Han Xiao, Yang Yunshuo, Zhu Aixiang
      Pages 49-61
    4. Zhang Fengli, Bai Yijing
      Pages 62-73
    5. Xing Zhang, Cancan Jin, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu
      Pages 74-87
    6. Yin Zhaoxia, Wang Huabin, Zhao Haifeng, Luo Bin, Zhang Xinpeng
      Pages 101-110
    7. Zhili Zhou, Huiyu Sun, Rohan Harit, Xianyi Chen, Xingming Sun
      Pages 123-132
    8. Xianyi Chen, Huiyu Sun, Yoshito Tobe, Zhili Zhou, Xingming Sun
      Pages 133-143
  3. System Security

    1. Front Matter
      Pages 145-145
    2. Nannan Shao, Zhiping Zhou, Ziwen Sun
      Pages 157-168
    3. Zhidan Wang, Jian Wang, Yanfei Zhao
      Pages 169-180
    4. Wang Shuwei, Wang Baosheng, Yong Tang, Yu Bo
      Pages 181-191

About these proceedings

Introduction

This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China. 
The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and government officials involved in the general areas of information security and cloud computing.

Keywords

Cloud computing, Quantum computing Wireless devices Sensor networks Reliability Availability Network privacy and anonymity Data center networks Virtual memory Access control Parallel computing models Cryptographic protocols Map Reduce algorithms Query learning Data integration Tamper-proof and tamper-resistant designs Privacy protections Trust frameworks

Editors and affiliations

  • Zhiqiu Huang
    • 1
  • Xingming Sun
    • 2
  • Junzhou Luo
    • 3
  • Jian Wang
    • 4
  1. 1.Nanjing University of Aeronautics and AsNanjingChina
  2. 2.Nanjing University of Information SciencNanjingChina
  3. 3.NanjingChina
  4. 4.Nanjing University of Aeronautics and AsNanjingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-27051-7
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-27050-0
  • Online ISBN 978-3-319-27051-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book