↓ Skip to main content

Trustworthy Computing and Services

Overview of attention for book
Cover of 'Trustworthy Computing and Services'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Software Trustworthiness: Past, Present and Future
  3. Altmetric Badge
    Chapter 2 A New Measurement Method for Software Trustworthiness Based on Rough Sets
  4. Altmetric Badge
    Chapter 3 Service Behavior Trustworthiness Management
  5. Altmetric Badge
    Chapter 4 Research on Identifying Method of Covert Channels in Database System
  6. Altmetric Badge
    Chapter 5 Software Testing is Necessary But Not Sufficient for Software Trustworthiness
  7. Altmetric Badge
    Chapter 6 A Measurement Model for Trustworthiness of Information System Based on Third-Party Testing Data
  8. Altmetric Badge
    Chapter 7 Overview of Monitor Selection in Computer Networks
  9. Altmetric Badge
    Chapter 8 Verification of Requirement Analysis Method for System Based on ISO/IEC 9126 Six Quality Characteristics
  10. Altmetric Badge
    Chapter 9 A Trustworthy Storage Framework on the Cloud
  11. Altmetric Badge
    Chapter 10 Progress in Study of Encrypted Traffic Classification
  12. Altmetric Badge
    Chapter 11 Trustworthiness: From a Social Phenomenon to Internet Technology
  13. Altmetric Badge
    Chapter 12 Introduction of Quality Requirement and Evaluation Based on ISO/IEC SQuaRE Series of Standard
  14. Altmetric Badge
    Chapter 13 A Survey on the Security of Multihop Ad Hoc Network
  15. Altmetric Badge
    Chapter 14 Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption
  16. Altmetric Badge
    Chapter 15 The Measurement and Analysis of KAD Network
  17. Altmetric Badge
    Chapter 16 Encrypted Traffic Classification Based on an Improved Clustering Algorithm
  18. Altmetric Badge
    Chapter 17 Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association
  19. Altmetric Badge
    Chapter 18 Security and Trust Model for Data Disaster-Recovery Service on the Cloud
  20. Altmetric Badge
    Chapter 19 Towards Analyzing Traceability of Data Leakage by Malicious Insiders
  21. Altmetric Badge
    Chapter 20 Dynamic Task Scheduling in Cloud Computing Based on Greedy Strategy
  22. Altmetric Badge
    Chapter 21 A Multi-modal Clustering Method for Web Videos
  23. Altmetric Badge
    Chapter 22 Incorporate Spatial Information into pLSA for Scene Classification
  24. Altmetric Badge
    Chapter 23 A Trust-Based Data Backup Method on the Cloud
  25. Altmetric Badge
    Chapter 24 Active RFID-Based Indoor Localization Algorithm Using Virtual Reference through Bivariate Newton Interpolation
  26. Altmetric Badge
    Chapter 25 An Implementation of Trusted Remote Attestation Oriented the IaaSCloud
  27. Altmetric Badge
    Chapter 26 C-SURF: Colored Speeded Up Robust Features
  28. Altmetric Badge
    Chapter 27 Mining Explainable User Interests from Scalable User Behavior Data
  29. Altmetric Badge
    Chapter 28 An Improved Design of the Trustworthiness Authentication Mechanism of IaaS
  30. Altmetric Badge
    Chapter 29 Research on Simulation and Real-Time Evaluation Method of IoT-Oriented Complex System
  31. Altmetric Badge
    Chapter 30 A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks
  32. Altmetric Badge
    Chapter 31 A Pervasive Technology Approach to Social Trustworthiness
  33. Altmetric Badge
    Chapter 32 Policy-Based De-duplication in Secure Cloud Storage
  34. Altmetric Badge
    Chapter 33 A New Method Based on Fuzzy C-Means Algorithm for Search Results Clustering
  35. Altmetric Badge
    Chapter 34 A Distance Adaptive Embedding Method in Dimension Reduction
  36. Altmetric Badge
    Chapter 35 Joint Cognitive Access and Power Control in Two-Tie Femtocell Networks
  37. Altmetric Badge
    Chapter 36 Based on Support Vector and Word Features New Word Discovery Research
  38. Altmetric Badge
    Chapter 37 A Flexible Framework for Representations of Entities in the Internet of Things
  39. Altmetric Badge
    Chapter 38 Community Detection Based on Robust Label Propagation Algorithm
  40. Altmetric Badge
    Chapter 39 Clock Synchronization Algorithm for Distributed Video Surveillance Based on PTP
  41. Altmetric Badge
    Chapter 40 A Low-Complexity Vector Perturbation Precoding Approach Based on Reactive Tabu Search for Large Multiuser MIMO Systems
  42. Altmetric Badge
    Chapter 41 A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud Computing
  43. Altmetric Badge
    Chapter 42 Hiding Signatures in Variable Names
  44. Altmetric Badge
    Chapter 43 Chinese New Words Detection Using Mutual Information
  45. Altmetric Badge
    Chapter 44 An Efficient Parallel String Matching Algorithm Based on DFA
  46. Altmetric Badge
    Chapter 45 A Ciphertext Data Retrieval Method Based on Cloud Storage
  47. Altmetric Badge
    Chapter 46 A Multi-phase k -anonymity Algorithm Based on Clustering Techniques
  48. Altmetric Badge
    Chapter 47 A P2P Reputation Model Based on P2P File-Sharing Behavioral Characteristics
  49. Altmetric Badge
    Chapter 48 Unobservable Rendezvous Negotiation in P2P Networks
  50. Altmetric Badge
    Chapter 49 A Hierarchical Method for Clustering Binary Text Image
  51. Altmetric Badge
    Chapter 50 Search Results Evaluation Based on User Behavior
  52. Altmetric Badge
    Chapter 51 Classification Research on SSL Encrypted Application
  53. Altmetric Badge
    Chapter 52 S-URL Flux: A Novel C&C Protocol for Mobile Botnets
  54. Altmetric Badge
    Chapter 53 An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking Facebook CAPTCHA
  55. Altmetric Badge
    Chapter 54 Security and Cost Analyses of DNSSEC Protocol
  56. Altmetric Badge
    Chapter 55 An Automatic Approach to Detect Anti-debugging in Malware Analysis
  57. Altmetric Badge
    Chapter 56 OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical Characteristics
  58. Altmetric Badge
    Chapter 57 An Intent-Driven Masquerader Detection Framework Based on Data Fusion
  59. Altmetric Badge
    Chapter 58 An Integration of Several Different Data Flow Analysis Techniques
  60. Altmetric Badge
    Chapter 59 Specifying and Detecting Behavioral Changes in Source Code Using Abstract Syntax Tree Differencing
  61. Altmetric Badge
    Chapter 60 Timing Aspects Construction Using UML-MARTE Profile
  62. Altmetric Badge
    Chapter 61 An Overtime-Detection Model-Checking Technique for Interrupt Processing Systems
  63. Altmetric Badge
    Chapter 62 MDE-Based Verification of SysML State Machine Diagram by UPPAAL
  64. Altmetric Badge
    Chapter 63 CppIns: A Source Query Language for Instrumentation
  65. Altmetric Badge
    Chapter 64 An UML Model Query Method Based on Structure Pattern Matching
  66. Altmetric Badge
    Chapter 65 A Lightweight Type Enforcement Access Control Approach with Role Based Authorization
  67. Altmetric Badge
    Chapter 66 Composition of AADL Components by Transformation to Interface Automata
  68. Altmetric Badge
    Chapter 67 Finding δ -Closure Property of BitTorrent System and Applications Based on This Property
  69. Altmetric Badge
    Chapter 68 A Tool to Construct One Comprehensive Legal Environment for Behavioral Incompatible Components
  70. Altmetric Badge
    Chapter 69 Research of Security Relationship Based on Social Networks
  71. Altmetric Badge
    Chapter 70 Vulnerability Evaluating Based on Attack Graph
  72. Altmetric Badge
    Chapter 71 A Dynamic Strategy to Cache Out-of-Sequence Packet in DPI System
  73. Altmetric Badge
    Chapter 72 Speeding Up Double-Array Trie Construction for String Matching
  74. Altmetric Badge
    Chapter 73 Modeling of Hierarchical Index System for Network Operation Security
  75. Altmetric Badge
    Chapter 74 An Evaluation Framework of Coverage-Based Fault Localization for Object-Oriented Programs
  76. Altmetric Badge
    Chapter 75 Research of New Words Identification in Social Network for Monitoring Public Opinion
  77. Altmetric Badge
    Chapter 76 A Novel Dynamic Self-adaptive Framework for Network Security Evaluation
  78. Altmetric Badge
    Chapter 77 Wireless Sensor Network MAC Protocol Used in the City Fire
  79. Altmetric Badge
    Chapter 78 The Application of Robot Localization and Navigation Based on WSN in the Disaster Relief
  80. Altmetric Badge
    Chapter 79 Comparison and Performance Analysis of Join Approach in MapReduce
  81. Altmetric Badge
    Chapter 80 Analysis of Public Sentiment Based on SMS Content
  82. Altmetric Badge
    Chapter 81 Control Method of Twitter- and SMS-Based Mobile Botnet
  83. Altmetric Badge
    Chapter 82 A Cache Management Strategy for Transparent Computing Storage System
  84. Altmetric Badge
    Chapter 83 Network Security Situation Prediction Based on BP and RBF Neural Network
  85. Altmetric Badge
    Chapter 84 Research on Redundant Channel Model Based on Spatial Correlation in IOT
  86. Altmetric Badge
    Chapter 85 Design of a Trusted File System Based on Hadoop
  87. Altmetric Badge
    Chapter 86 Architecting Dependable Many-Core Processors Using Core-Level Dynamic Redundancy
  88. Altmetric Badge
    Chapter 87 Study on Transformed Keywords Identification in Spam Filtering
  89. Altmetric Badge
    Chapter 88 Preliminary Study of Enhanced Collaborative Information Extracting and Sharing System
  90. Altmetric Badge
    Chapter 89 A Compatible and Graphical Modeling Approach for Earth System Model
  91. Altmetric Badge
    Chapter 90 Who Can Haul the ANDON-CORD in the Software Development Process
  92. Altmetric Badge
    Chapter 91 Research and Implement of Security Situation Awareness System YH-SSAS
  93. Altmetric Badge
    Chapter 92 A Reliable Query Scheme for Outsourced Data in Cloud
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
2 X users
facebook
1 Facebook page
wikipedia
1 Wikipedia page

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
62 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Trustworthy Computing and Services
Published by
Springer Berlin Heidelberg, January 2013
DOI 10.1007/978-3-642-35795-4
ISBNs
978-3-64-235794-7, 978-3-64-235795-4
Editors

Yuan, Yuyu, Wu, Xu, Lu, Yueming, Yuan, Yuyu, Wu, Xu, Lu, Yueming

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 62 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Spain 1 2%
India 1 2%
Brazil 1 2%
Taiwan 1 2%
China 1 2%
Argentina 1 2%
Unknown 56 90%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 19 31%
Student > Master 15 24%
Student > Bachelor 6 10%
Researcher 5 8%
Student > Postgraduate 5 8%
Other 7 11%
Unknown 5 8%
Readers by discipline Count As %
Computer Science 44 71%
Engineering 4 6%
Unspecified 3 5%
Business, Management and Accounting 2 3%
Social Sciences 2 3%
Other 2 3%
Unknown 5 8%