Laurence T. Yang / Hai Jin / Jianhua Ma / Theo Ungerer
Autonomic and Trusted Computing
Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006
Herausgegeben:Yang, Laurence T.; Jin, Hai; Ungerer, Theo
Laurence T. Yang / Hai Jin / Jianhua Ma / Theo Ungerer
Autonomic and Trusted Computing
Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006
Herausgegeben:Yang, Laurence T.; Jin, Hai; Ungerer, Theo
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ATC 2006, held in Wuhan, China in September 2006. The 57 revised full papers presented together with two keynotes were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections.
Andere Kunden interessierten sich auch für
- OkadaSoftware Security -- Theories and Systems42,99 €
- Foundations of Security Analysis and Design42,99 €
- Riccardo Focardi / Roberto Gorrieri (eds.)Foundations of Security Analysis and Design42,99 €
- George Davida / Yair Frankel / Owen Rees (eds.)Infrastructure Security42,99 €
- Computer Security - ESORICS 9242,99 €
- Frederic Cuppens / Yves Deswarte / Dieter Gollmann / Michael Waidner (eds.)Computer Security - ESORICS 200042,99 €
- Jürgen EbnerEinstieg in Kali Linux33,00 €
-
-
-
This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ATC 2006, held in Wuhan, China in September 2006. The 57 revised full papers presented together with two keynotes were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 4158
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 11839569, 978-3-540-38619-3
- 2006
- Seitenzahl: 636
- Erscheinungstermin: 25. August 2006
- Englisch
- Abmessung: 235mm x 155mm x 34mm
- Gewicht: 880g
- ISBN-13: 9783540386193
- ISBN-10: 354038619X
- Artikelnr.: 20946982
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 4158
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 11839569, 978-3-540-38619-3
- 2006
- Seitenzahl: 636
- Erscheinungstermin: 25. August 2006
- Englisch
- Abmessung: 235mm x 155mm x 34mm
- Gewicht: 880g
- ISBN-13: 9783540386193
- ISBN-10: 354038619X
- Artikelnr.: 20946982
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Keynote Speech.- Emergence in Organic Computing Systems: Discussion of a Controversial Concept.- Managing Trust in Distributed Agent Systems.- Track 1: Autonomic/Organic Computing and Communications.- Towards a Standards-Based Autonomic Context Management System.- Formal Modeling and Verification of Systems with Self-x Properties.- A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems.- Autonomic Interference Avoidance with Extended Shortest Path Algorithm.- Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems.- From Components to Autonomic Elements Using Negotiable Contracts.- Self-configuration Via Cooperative Social Behavior.- Towards Ontology-Based Embedded Services.- TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System.- Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks.- Autonomic Group Location Update for Mobile Networks.- Autonomic and Trusted Computing Paradigms.- Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks.- Self Awareness and Adaptive Traffic Signal Control System for Smart World.- Development and Runtime Support for Situation-Aware Security in Autonomic Computing.- Track 2: Trust Models and Trustworthy Systems/Services.- A Social Network-Based Trust Model for the Semantic Web.- Fuzzy Model Tuning for Intrusion Detection Systems.- PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems.- An Integration Framework for Trustworthy Transactions.- Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology.- Toward Trust Management in Autonomic and Coordination Applications.- Bayesian Network Based Trust Management.- An Improved Global Trust Value Computing Method in P2PSystem.- Trusted Priority Control Design for Information Networks Based on Sociotechnology.- Autonomic Trust Management in a Component Based Software System.- A Risk Assessment Model for Enterprise Network Security.- A Security Management Framework with Roaming Coordinator for Pervasive Services.- A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications.- Automatic Composition of Secure Workflows.- TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting.- A Group Based Reputation System for P2P Networks.- An Approach for Trusted Interoperation in a Multidomain Environment.- Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project.- MTrust: A Reputation-Based Trust Model for a Mobile Agent System.- Ubisafe Computing: Vision and Challenges (I).- Track 3: Cryptography, Security and Privacy.- Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters.- Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services.- Remote Authentication with Forward Security.- A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization.- An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment.- Efficient Signcryption Without Random Oracles.- Two Novel Packet Marking Schemes for IP Traceback.- A Novel Rate Limit Algorithm Against Meek DDoS Attacks.- Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone.- A New ID-Based Broadcast Encryption Scheme.- Automated Abduction for Computer Forensics.- A Framework for Specifying and Managing Security Requirements in Collaborative Systems.- System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control inLarge-Scale Wireless Sensor Networks.- On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption.- Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).- Track 4: Reliability, Fault Tolerance and Dependable Systems.- A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates.- A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment.- FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS.- Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems.- Active Fault-Tolerant System for Open Distributed Computing.- A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases.- An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
Keynote Speech.- Emergence in Organic Computing Systems: Discussion of a Controversial Concept.- Managing Trust in Distributed Agent Systems.- Track 1: Autonomic/Organic Computing and Communications.- Towards a Standards-Based Autonomic Context Management System.- Formal Modeling and Verification of Systems with Self-x Properties.- A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems.- Autonomic Interference Avoidance with Extended Shortest Path Algorithm.- Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems.- From Components to Autonomic Elements Using Negotiable Contracts.- Self-configuration Via Cooperative Social Behavior.- Towards Ontology-Based Embedded Services.- TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System.- Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks.- Autonomic Group Location Update for Mobile Networks.- Autonomic and Trusted Computing Paradigms.- Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks.- Self Awareness and Adaptive Traffic Signal Control System for Smart World.- Development and Runtime Support for Situation-Aware Security in Autonomic Computing.- Track 2: Trust Models and Trustworthy Systems/Services.- A Social Network-Based Trust Model for the Semantic Web.- Fuzzy Model Tuning for Intrusion Detection Systems.- PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems.- An Integration Framework for Trustworthy Transactions.- Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology.- Toward Trust Management in Autonomic and Coordination Applications.- Bayesian Network Based Trust Management.- An Improved Global Trust Value Computing Method in P2PSystem.- Trusted Priority Control Design for Information Networks Based on Sociotechnology.- Autonomic Trust Management in a Component Based Software System.- A Risk Assessment Model for Enterprise Network Security.- A Security Management Framework with Roaming Coordinator for Pervasive Services.- A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications.- Automatic Composition of Secure Workflows.- TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting.- A Group Based Reputation System for P2P Networks.- An Approach for Trusted Interoperation in a Multidomain Environment.- Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project.- MTrust: A Reputation-Based Trust Model for a Mobile Agent System.- Ubisafe Computing: Vision and Challenges (I).- Track 3: Cryptography, Security and Privacy.- Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters.- Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services.- Remote Authentication with Forward Security.- A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization.- An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment.- Efficient Signcryption Without Random Oracles.- Two Novel Packet Marking Schemes for IP Traceback.- A Novel Rate Limit Algorithm Against Meek DDoS Attacks.- Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone.- A New ID-Based Broadcast Encryption Scheme.- Automated Abduction for Computer Forensics.- A Framework for Specifying and Managing Security Requirements in Collaborative Systems.- System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control inLarge-Scale Wireless Sensor Networks.- On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption.- Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).- Track 4: Reliability, Fault Tolerance and Dependable Systems.- A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates.- A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment.- FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS.- Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems.- Active Fault-Tolerant System for Open Distributed Computing.- A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases.- An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.