Frontier technologies of trust computing and network security


Autoria(s): Xiang, Yang; Al-Dubi, Ahmed; Liu, Lei; Chu, Xiaowen
Data(s)

01/01/2015

Resumo

The increasing complexity of computer systems and communication networks induces tremendous requirements for trust and security. This special issue includes topics on trusted computing, risk and reputation management, network security and survivable computer systems/networks. These issues have evolved into an active and important area of research and development. The past decade has witnessed a proliferation of concurrency and computation systems for practice of highly trust, security and privacy, which has become a key subject in determining future research and development activities in many academic and industrial branches. This special issue aims to present and discuss advances of current research and development in all aspects of trusted computing and network security. In addition, this special issue provides snapshots of contemporary academia work in the field of network trusted computing. We prepared and organized this special issue to record state-of-the-art research, novel development and trends for future insight in this domain. In this special issue, 14 papers have been accepted for publication, which demonstrate novel and original work in this field. A detailed overview of the selected works is given below.

Identificador

http://hdl.handle.net/10536/DRO/DU:30077771

Idioma(s)

eng

Publicador

Wiley

Relação

http://dro.deakin.edu.au/eserv/DU:30077771/xiang-yang-frontier-editorial-2015.pdf

http://www.dx.doi.org/10.1002/cpe.3458

Direitos

2015, Wiley

Palavras-Chave #Science & Technology #Technology #Computer Science, Software Engineering #Computer Science, Theory & Methods #Computer Science
Tipo

Journal Article