Cloud Computing and Security

Cloud Computing and Security Front Cover
0 Reviews
562 pages

Book Description

This book constitutes the proceedings of the International Conference on Cloud and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China.

The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and government officials involved in the general areas of information security and cloud computing.

Table of Contents

  • VH: A Lightweight Block Cipher Based on Dual Pseudo-random Transformation
  • Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme
  • Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud
  • A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryption
  • Privacy-Preserving Multidimensional Range Query on Real-Time Data
  • ARM-Based Privacy Preserving
  • Attribute-Based Encryption Without Key Escrow
  • An Efficient Access Control Optimizing Technique Based on Local Agency in Cryptographic Cloud Storage
  • Complete Separable Reversible Data Hiding in Encrypted Image
  • Multi-threshold Image Segmentation Through an Improved Quantum-Behaved Particle Swarm Optimization Algorithm
  • Coverless Image Steganography Without Embedding
  • Coverless Information Hiding Method Based on the Chinese Mathematical Expression
  • System Security
  • Information Security Challenges and Relevant Strategic Thinking as Highlighted by ``PRISM''
  • A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks
  • The Optimization Model of Trust for White-Washing
  • Malware Clustering Based on SNN Density Using System Calls
  • Analyzing Eventual Leader Election Protocols for Systems by Probabilistic Model Checking
  • A Dynamic Resource Allocation Model for Guaranteeing Quality of in Defined Networking Based Cloud Computing Environment
  • Research and Development of Trust Mechanism in Cloud Computing
  • Analysis of Advanced Cyber Attacks with Quantified ESM
  • A Web Security Testing Method Based on Web Application Structure
  • An Improved Data Cleaning Algorithm Based on SNM
  • Enhancing Security of IaaS Cloud with Fraternal Security Cooperation Between Cloud Platform and Virtual Platform
  • Cloud Platform
  • Cluster Analysis by Variance Ratio Criterion and Quantum-Behaved PSO
  • Failure Modes and Effects Analysis Using Multi-factors Comprehensive Weighted Fuzzy TOPSIS
  • Efficient Query Algorithm of Coallocation-Parallel-Hash-Join in the Cloud Data Center
  • Dynamic Data Driven Particle Filter for Agent-Based Traffic State Estimation
  • An Improved Dynamic Spectrum Access Scheme in Cognitive Networks
  • The Design and Implementation of a Dynamic Verification System of Z
  • Maximizing Positive Influence in Signed Social Networks
  • OpenFlow-Based Load Balancing for Wireless Mesh Network
  • SPEMS: A Stealthy and Practical Execution Monitoring System Based on VMI
  • A Total Power Control Cooperative MAC Protocol for Wireless Sensor Networks
  • Parallel Processing of SAR Imaging Algorithms for Large Areas Using Multi-
  • An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform
  • Data Analysis in Cloud
  • Wind Speed and Direction Predictions Based on Multidimensional Support Vector Regression with Data-Dependent Kernel
  • Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization Environment
  • Performance Analysis of (1+1)EA on the Maximum Independent Set Problem
  • A Robust Iris Segmentation Algorithm Using Active Contours Without Edges and Improved Circular Hough Transform
  • An Adaptive Hybrid PSO and GSA Algorithm for Association Rules Mining
  • Sequential Pattern Mining and Matching Method with Its Application on Earthquakes
  • Teaching Quality Assessment Model Based on Analytic Hierarchy Process and LVQ Neural Network
  • Fast Sparse Representation Classification Using Transfer Learning
  • Probing the Scheduling Algorithms in the Cloud Based on OpenStack
  • Top-k Distance-Based Outlier Detection on Uncertain Data
  • An Airport Noise Prediction Model Based on Selective Ensemble of LOF-FSVR
  • Application of Semantic-Based Laplacian Eigenmaps Method in 3D Model Classification and Retrieval

Book Details

  • Title: Cloud Computing and Security
  • Length: 562 pages
  • Edition: 1st ed. 2015
  • Language: English
  • Publisher:
  • Publication Date: 2016-02-12
  • ISBN-10: 3319270508
  • ISBN-13: 9783319270500
Download LinkFormatSize (MB)Upload Date
Download from ZippyShareTrue PDF18.503/21/2016
Download from ZippyShareTrue PDF18.509/25/2017
How to Download? Report Dead Links & Get a Copy