Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Cloud Computing, Security, Privacy in New Computing Environments -

Cloud Computing, Security, Privacy in New Computing Environments

7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings
Buch | Softcover
XIV, 240 Seiten
2017 | 1st ed. 2018
Springer International Publishing (Verlag)
978-3-319-69604-1 (ISBN)
CHF 74,85 inkl. MwSt
This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016.The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments.

Software Defined Network Routing in Wireless Sensor Network.- Efficient Graph Mining on Heterogeneous Platforms in the Cloud.- Correlation-Aware Virtual Machine Placement in Data Center Networks.- Connectivity-Aware Virtual Machine Placement in 60GHz Wireless Cloud Center.- Ethical Trust in Cloud Computing Using Fuzzy Logic.- Answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users.- Mobile Cloud Platform: Architecture Deployment and Big Data Applications.- Research on Algorithm and Model of Hand Gestures Recognition Based on HMM.- Question Recommendation Based on User Model in CQA.- Data Storage Protection of Community Medical Internet of Things.- Generalized Format-preserving Encryption for Character Data.- Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System.- Ring Signature Scheme from Multilinear Maps in the Standard Model.- A Revocable Outsourcing Attribute-based Encryption Scheme.- Operational-behavior Auditing in Cloud Storage.-Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud.- Secure Searchable Public-Key Encryption for Cloud Storage.- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images.- Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks.- DMSD-FPE: Data masking system for database based on format-preserving encryption.- Delay-tolerant Network Based Secure Transmission System Design.- An Internal Waves Detection Method Based on PCANet for Images Captured from UAV.

Erscheinungsdatum
Reihe/Serie Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Zusatzinfo XIV, 240 p. 61 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 393 g
Themenwelt Mathematik / Informatik Informatik Netzwerke
Schlagworte algorithms • Applications • Artificial Intelligence • authentications • Cloud Computing • Computer Networks • Computer Science • conference proceedings • cryptography • Cyber-Physical Systems • data privacy • Data Security • Encryption • Human-Computer Interaction (HCI) • Informatics • Internet of Things (IoT) • privacy • Public Key Cryptography • Research • Routing Protocols • security • telecommunication traffic • User Interfaces • Web Services • wireless sensor networks
ISBN-10 3-319-69604-1 / 3319696041
ISBN-13 978-3-319-69604-1 / 9783319696041
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich