Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9483)
Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)
Included in the following conference series:
Conference proceedings info: ICCCS 2015.
Buy print copy
About this book
The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and government officials involved in the general areas of information security and cloud computing.
Similar content being viewed by others
Keywords
- Cloud computing,
- Quantum computing
- Wireless devices
- Sensor networks
- Reliability
- Availability
- Network privacy and anonymity
- Data center networks
- Virtual memory
- Access control
- Parallel computing models
- Cryptographic protocols
- Map Reduce algorithms
- Query learning
- Data integration
- Tamper-proof and tamper-resistant designs
- Privacy protections
- Trust frameworks
- algorithm analysis and problem complexity
Table of contents (47 papers)
-
Data Analysis in Cloud
Other volumes
-
Cloud Computing and Security
Editors and Affiliations
Bibliographic Information
Book Title: Cloud Computing and Security
Book Subtitle: First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers
Editors: Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-27051-7
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-27050-0Published: 06 January 2016
eBook ISBN: 978-3-319-27051-7Published: 04 January 2016
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 562
Number of Illustrations: 211 illustrations in colour
Topics: Information Systems Applications (incl. Internet), Computer Communication Networks, Algorithm Analysis and Problem Complexity, Management of Computing and Information Systems, Cryptology, Computers and Society