Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

402 authors
Adel, Alkhalil
Migration to Cloud Computing- The Impact on IT Management and Security
Aiqun, Hu
A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks
Arabi, E. keshk
An Ant Algorithm for Cloud Task Scheduling
Ashraf, El-Sisi
An Ant Algorithm for Cloud Task Scheduling
Bai, Jian
Improved Homomorphic String Bits Encryption Public-key Cryptosystem based on LWE
Baimu, Yu
A Probabilistic Encryption Way in Knapsack PKC
Bao, Wen-xing
Application of Cloud Manufacturing based on the principle of Process-Aware Information System
Baomin, Wang
An Efficient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage
Bei, Jia
Research of a MapReduce Communication Data Stream Processing Model
Bin, Yu
Study on Cloud Computing Data Center Infrastructure Best Practices
Bo, He
A method for designing Hash function based on chaotic neural network
Bowen, Yuan
A replica pre-placement strategy based on correlation analysis in cloud environment
Boya, Zhao
A Design and Application of Tilt Angle Algorithm Based on the 3-axis Acceleration Sensor
Can, Wang
Intelligent Resources Dispatching System of Urban Emergency Based on SOA and Cloud Computing
Canyan, Zhu
A Detecting and Defending Method of Wormhole Attack Based on Time Ruler
Changfei, Zhou
MIC Acceleration of Saliency Detection Algorithm
Chaoyuan, Cui
VMPmonitor: An Efficient Modularity Approach for Hidden Process Detection
Charles, Z.-Z. Liu
Initially Cognitive Computation with Self-Organization Strategy for Securely Humanized Human-Machine Interactions
Chen, Guilin
Dependability Modelling and Evaluation of Cyber-Physical Systems: A Model-Driven Perspective
Chen, Hua-sha
Based on PSO cloud computing server points location searching
Chen, Li
A Mechanism for Dependability Processing of Information Flow in Cloud Computing
Chen, Lu
Review of Aircraft Aerodynamic Force Parameters Identification based on the Intelligent Algorithm
Chen, Lu
The digital library cloud storage based on Hadoop
Chen, Ningjiang
On User Capacity Optimization Strategy of Server Computing Based Desktop Cloud
Chen, Xiaojun
A Real-Time Authentication Method Based on Cursor-hidden Scene
Chen, Yong-qiang
Active Defense strategies selection for network mixed malicious action
Chen, Zhi yun
Based on PSO cloud computing service discovering
ChengDong, Xu
Design Task Modeling and Task Allocation Method Research Based Multi-granularity Space in Distributed Network Environment
Chengqi, Yi
Online Community Perceiving Method on Social Network
Chengyu, Tan
Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm
Chengzhi, Cao
Vulnerability Mining Techniques in Android Platform
Chi, YaPing
Research on Authentication Method for Virtual Desktop System based on CPK
Chien-Sing, Lee
PeANFIS-FARM Framework in Defending against Web Service Attacks
Chongguo, Wang
Distributed Hybrid Cloud Architecture Based on China Education Research Network for Common Computer Test
Chun, Liu
A Cloud-based China s Landslide Disaster Database (CCLDD) Development and Analysis
ChunSheng, Hu
Design Task Modeling and Task Allocation Method Research Based Multi-granularity Space in Distributed Network Environment
Chunping, Zhang
OPC:An Effective Memory Computing Solution of Big Data For PC
Chunyan, Hu
The Study of Improved FP-Growth Algorithm in MapReduce
Cong, Xu
Deployment and Performance Evaluation of Virtual Network based on OpenStack
Cuilan, Du
The Secrets of Skype Login
David, John
Migration to Cloud Computing- The Impact on IT Management and Security
Dawu, Gu
An Improved Scheme for Range Queries on Encrypted Data
Diming, Zhang
Design and Implementation of Data Encryption in Cloud based on HDFS
Divya, Bansal
Bivariate Classification of Malware in JavaScript using Dynamic Analysis
Divya, Bansal
Security Vulnerabilities in SAML based Single Sign-On Authentication in Cloud
Donghai, Zhu
A Strategy of Dynamic Replica Creation in Cloud Storage
Fan, Liu
A Group Based Identity Anonymity and Secure Cloud Storage Scheme
Fang, Lu-lu
The Research and Design of Cloud Computing Framework Model Based on SOA
Fang-Juan, Zhang
A new SS-closedness in L-topological spaces
Fangbiao, Li
Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper
Fangbiao, Li
Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication
Fangbiao, Li
Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination
Fawzy, A. Torkey
An Ant Algorithm for Cloud Task Scheduling
Fei, Liu
Architectural Support for Lease-Regulated Secret Data
Fei, Qiao
Research and application of the location information in the intelligent transportation
Feng, Lin
OPC:An Effective Memory Computing Solution of Big Data For PC
Feng, Xu
The SLA Framework Based on Cloud Computing
Fu, Yu
Active Defense strategies selection for network mixed malicious action
Fu-gui, Luo
IPv6 marked packets preprocessing scheme research based on Hash table
Gaik-Yee, Chan
PeANFIS-FARM Framework in Defending against Web Service Attacks
Gang, Shi
Distributed Hybrid Cloud Architecture Based on China Education Research Network for Common Computer Test
Genqing, Bian
Research of Replica Replacement Strategy Oriented Cloud Storage
Gong, Jian
Detecting Machine Generated Domain Names Based on Morpheme Features
Guiqing, Du
Short-term Load forecasting by a new hybrid model
Guo-Chun, Tang
Research on the Model for Cloud Security Based on SLA
Guoan, Zhang
Robust cepstrum device fingerprint of proximity coupling RFID tags
Guofang, Yu
Multi-Sub-Swarm PSO Classifier Design and Rule Extraction
Guohao, Liu
Cryptographic classification of quasigroups of order 4
Guoyuan, Lv
A Detecting and Defending Method of Wormhole Attack Based on Time Ruler
HU, Baofang
The Application of Cloud Computing in Large-Scale Statistic
Haihe, Ba
TEM: A Novel Measurement Method for Java Applications on demand in Cloud Computing
Haijia, Wu
A method based on compressive sensing to detect community structure using deep belief network
Haining, Lu
An Improved Scheme for Range Queries on Encrypted Data
Haiquan, Xiong
The Architectural Based Interception and Identification of System Call Instruction within VMM
Han, Qiang
Application of Cloud Manufacturing based on the principle of Process-Aware Information System
Hao, Huang
Design and Implementation of Data Encryption in Cloud based on HDFS
Hao, Liu
A Mechanism for Dependability Processing of Information Flow in Cloud Computing
Hehong, Guo
Short-term Load forecasting by a new hybrid model
Hengjing, He
Future trend of integrating instrumentation into the cloud
Hequn, Xian
Dynamic Constraint Definition Method in Cloud Databases
Hong, Sun
The Study of Improved FP-Growth Algorithm in MapReduce
Hong, Zhou
A Trusted VM-vTPM Live Migration Protocol in Clouds
Hongbo, Wang
The digital library cloud storage based on Hadoop
Hongjun, Chen
The Research on Information Collection and Retrieval Technology of Big Data based Cloud Computing
Hongjun, Chen
The Applied Research on the Virtualization Technology in Cloud Computing
Hongliang, Liang
Access Control Framework for Android System
Honglin, Yuan
Robust cepstrum device fingerprint of proximity coupling RFID tags
Hongtao, Bai
Architectural Support for Lease-Regulated Secret Data
Hou, Zhan-sheng
The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation
Hu, Bin
The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation
Hu, Dandan
On User Capacity Optimization Strategy of Server Computing Based Desktop Cloud
Hu, Hai-rong
The Research and Design of Cloud Computing Framework Model Based on SOA
Hu, Jinlong
Study of Cloud Computing Security System Based on Rotational Stations
Hu, Xiaojing
Dependability Modelling and Evaluation of Cyber-Physical Systems: A Model-Driven Perspective
Hua-yu, Shi
Design of a Wireless Networks Detection and Management System Based on a Mobile Terminal
Huan, Yang
Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm
HuanGuo, Zhang
A Trusted VM-vTPM Live Migration Protocol in Clouds
Huang, Gaofeng
Design and Implementation of the Monitoring System for Critical Documents
Huaxuan, Zhang
The Study of Improved FP-Growth Algorithm in MapReduce
Hui, Zhang
Emergency-cloud a new idea about the construction of emergency platform in