Cloud computing and security : first International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised selected papers / Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang (eds.).Material type: TextSeries: Serienbezeichnung | Lecture notes in computer science ; 9483. | LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.Publisher: Cham : Springer, 2015Description: 1 online resource (xii, 562 pages) : color illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783319270517; 3319270516Other title: ICCCS 2015Subject(s): Cloud computing -- Security measures -- Congresses | Network hardware | Algorithms & data structures | Information architecture | Coding theory & cryptology | Ethical & social aspects of IT | Information retrieval | Computers -- Hardware -- Network Hardware | Computers -- Programming -- Algorithms | Business & Economics -- Information Management | Computers -- Security -- General | Computers -- Social Aspects -- General | Computers -- Information Technology | Algorithms | Computer networks | Computer science | Computers and civilization | Data encryption (Computer science) | Management information systemsGenre/Form: Electronic books. | Conference papers and proceedings. Additional physical formats: Printed edition:: No titleDDC classification: 004.67/82 LOC classification: QA76.585Online resources: Click here to access online
|Item type||Current library||Collection||Call number||Status||Date due||Barcode||Item holds|
Online resource; title from PDF title page (SpringerLink, viewed January 15, 2016).
Data Security -- System Security -- Cloud Platform -- and Data Analysis in Cloud.
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China. The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and government officials involved in the general areas of information security and cloud computing.
Includes bibliographical references at chapter ends, and author index.