Concurrency and Computation: Practice and Experience

Cover image for Vol. 27 Issue 12

Special Issue: Frontier technologies of trust computing and network security (TrustCom 2012)

25 August 2015

Volume 27, Issue 12

Pages i–ii, 2907–3144

Issue edited by: Yang Xiang, Ahmed Al-Dubi, Lei Liu, Xiaowen Chu

  1. Issue Information

    1. Top of page
    2. Issue Information
    3. Editorial
    4. Special Issue Papers
    1. Issue Information (pages i–ii)

      Article first published online: 23 JUL 2015 | DOI: 10.1002/cpe.3386

  2. Editorial

    1. Top of page
    2. Issue Information
    3. Editorial
    4. Special Issue Papers
    1. You have free access to this content
      Frontier technologies of trust computing and network security (pages 2907–2909)

      Yang Xiang, Ahmed Al-Dubi, Lei Liu and Xiaowen Chu

      Article first published online: 29 APR 2015 | DOI: 10.1002/cpe.3458

  3. Special Issue Papers

    1. Top of page
    2. Issue Information
    3. Editorial
    4. Special Issue Papers
    1. An overview of insider attacks in cloud computing (pages 2964–2981)

      Adrian Duncan, Sadie Creese and Michael Goldsmith

      Article first published online: 21 MAR 2014 | DOI: 10.1002/cpe.3243

    2. A lightweight software fault-tolerance system in the cloud environment (pages 2982–2998)

      Gang Chen, Hai Jin, Deqing Zou, Bing Bing Zhou and Weizhong Qiang

      Article first published online: 17 DEC 2013 | DOI: 10.1002/cpe.3190

    3. Role mining based on cardinality constraints (pages 3126–3144)

      Ruixuan Li, Huaqing Li, Xiwu Gu, Yuhua Li, Wei Ye and Xiaopu Ma

      Article first published online: 5 FEB 2015 | DOI: 10.1002/cpe.3456

SEARCH

SEARCH BY CITATION