This book constitutes the refereed proceedings of the 7 th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016.The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016…mehr
This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016.The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments.
Produktdetails
Produktdetails
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engi 19
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Software Defined Network Routing in Wireless Sensor Network.- Efficient Graph Mining on Heterogeneous Platforms in the Cloud.- Correlation-Aware Virtual Machine Placement in Data Center Networks.- Connectivity-Aware Virtual Machine Placement in 60GHz Wireless Cloud Center.- Ethical Trust in Cloud Computing Using Fuzzy Logic.- Answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users.- Mobile Cloud Platform: Architecture Deployment and Big Data Applications.- Research on Algorithm and Model of Hand Gestures Recognition Based on HMM.- Question Recommendation Based on User Model in CQA.- Data Storage Protection of Community Medical Internet of Things.- Generalized Format-preserving Encryption for Character Data.- Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System.- Ring Signature Scheme from Multilinear Maps in the Standard Model.- A Revocable Outsourcing Attribute-based Encryption Scheme.- Operational-behavior Auditing in Cloud Storage.-Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud.- Secure Searchable Public-Key Encryption for Cloud Storage.- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images.- Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks.- DMSD-FPE: Data masking system for database based on format-preserving encryption.- Delay-tolerant Network Based Secure Transmission System Design.- An Internal Waves Detection Method Based on PCANet for Images Captured from UAV.
Software Defined Network Routing in Wireless Sensor Network.- Efficient Graph Mining on Heterogeneous Platforms in the Cloud.- Correlation-Aware Virtual Machine Placement in Data Center Networks.- Connectivity-Aware Virtual Machine Placement in 60GHz Wireless Cloud Center.- Ethical Trust in Cloud Computing Using Fuzzy Logic.- Answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users.- Mobile Cloud Platform: Architecture Deployment and Big Data Applications.- Research on Algorithm and Model of Hand Gestures Recognition Based on HMM.- Question Recommendation Based on User Model in CQA.- Data Storage Protection of Community Medical Internet of Things.- Generalized Format-preserving Encryption for Character Data.- Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System.- Ring Signature Scheme from Multilinear Maps in the Standard Model.- A Revocable Outsourcing Attribute-based Encryption Scheme.- Operational-behavior Auditing in Cloud Storage.-Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud.- Secure Searchable Public-Key Encryption for Cloud Storage.- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images.- Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks.- DMSD-FPE: Data masking system for database based on format-preserving encryption.- Delay-tolerant Network Based Secure Transmission System Design.- An Internal Waves Detection Method Based on PCANet for Images Captured from UAV.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826