Frontier technologies of trust computing and network security

Xiang, Yang, Al-Dubi, Ahmed, Liu, Lei and Chu, Xiaowen 2015, Frontier technologies of trust computing and network security, Concurrency computation, vol. 27, pp. 2907-2909, doi: 10.1002/cpe.3458.

Attached Files
Name Description MIMEType Size Downloads

Title Frontier technologies of trust computing and network security
Author(s) Xiang, YangORCID iD for Xiang, Yang orcid.org/0000-0001-5252-0831
Al-Dubi, Ahmed
Liu, Lei
Chu, Xiaowen
Journal name Concurrency computation
Volume number 27
Start page 2907
End page 2909
Total pages 3
Publisher Wiley
Place of publication Chichester, Eng.
Publication date 2015
ISSN 1532-0626
1532-0634
Keyword(s) Science & Technology
Technology
Computer Science, Software Engineering
Computer Science, Theory & Methods
Computer Science
Summary The increasing complexity of computer systems and communication networks induces tremendous requirements for trust and security. This special issue includes topics on trusted computing, risk and reputation management, network security and survivable computer systems/networks. These issues have evolved into an active and important area of research and development. The past decade has witnessed a proliferation of concurrency and computation systems for practice of highly trust, security and privacy, which has become a key subject in determining future research and development activities in many academic and industrial branches. This special issue aims to present and discuss advances of current research and development in all aspects of trusted computing and network security. In addition, this special issue provides snapshots of contemporary academia work in the field of network trusted computing. We prepared and organized this special issue to record state-of-the-art research, novel development and trends for future insight in this domain. In this special issue, 14 papers have been accepted for publication, which demonstrate novel and original work in this field. A detailed overview of the selected works is given below.
Language eng
DOI 10.1002/cpe.3458
Field of Research 080599 Distributed Computing not elsewhere classified
080399 Computer Software not elsewhere classified
Socio Economic Objective 890299 Computer Software and Services not elsewhere classified
HERDC Research category C4 Letter or note
ERA Research output type X Not reportable
Copyright notice ©2015, Wiley
Persistent URL http://hdl.handle.net/10536/DRO/DU:30077771

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 26 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Fri, 08 Apr 2016, 19:13:11 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.