Autonomic and Trusted Computing Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Yang, Laurence T. (Επιμελητής έκδοσης), Jin, Hai (Επιμελητής έκδοσης), Ma, Jianhua (Επιμελητής έκδοσης), Ungerer, Theo (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4158
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06669nam a22006015i 4500
001 978-3-540-38622-3
003 DE-He213
005 20151204183323.0
007 cr nn 008mamaa
008 100301s2006 gw | s |||| 0|eng d
020 |a 9783540386223  |9 978-3-540-38622-3 
024 7 |a 10.1007/11839569  |2 doi 
040 |d GrThAP 
050 4 |a QA75.5-76.95 
072 7 |a UY  |2 bicssc 
072 7 |a UYA  |2 bicssc 
072 7 |a COM014000  |2 bisacsh 
072 7 |a COM031000  |2 bisacsh 
082 0 4 |a 004.0151  |2 23 
245 1 0 |a Autonomic and Trusted Computing  |h [electronic resource] :  |b Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006. Proceedings /  |c edited by Laurence T. Yang, Hai Jin, Jianhua Ma, Theo Ungerer. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2006. 
300 |a XVI, 616 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 4158 
505 0 |a Keynote Speech -- Emergence in Organic Computing Systems: Discussion of a Controversial Concept -- Managing Trust in Distributed Agent Systems -- Track 1: Autonomic/Organic Computing and Communications -- Towards a Standards-Based Autonomic Context Management System -- Formal Modeling and Verification of Systems with Self-x Properties -- A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems -- Autonomic Interference Avoidance with Extended Shortest Path Algorithm -- Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems -- From Components to Autonomic Elements Using Negotiable Contracts -- Self-configuration Via Cooperative Social Behavior -- Towards Ontology-Based Embedded Services -- TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System -- Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks -- Autonomic Group Location Update for Mobile Networks -- Autonomic and Trusted Computing Paradigms -- Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks -- Self Awareness and Adaptive Traffic Signal Control System for Smart World -- Development and Runtime Support for Situation-Aware Security in Autonomic Computing -- Track 2: Trust Models and Trustworthy Systems/Services -- A Social Network-Based Trust Model for the Semantic Web -- Fuzzy Model Tuning for Intrusion Detection Systems -- PATROL-F – A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems -- An Integration Framework for Trustworthy Transactions -- Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology -- Toward Trust Management in Autonomic and Coordination Applications -- Bayesian Network Based Trust Management -- An Improved Global Trust Value Computing Method in P2P System -- Trusted Priority Control Design for Information Networks Based on Sociotechnology -- Autonomic Trust Management in a Component Based Software System -- A Risk Assessment Model for Enterprise Network Security -- A Security Management Framework with Roaming Coordinator for Pervasive Services -- A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications -- Automatic Composition of Secure Workflows -- TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting -- A Group Based Reputation System for P2P Networks -- An Approach for Trusted Interoperation in a Multidomain Environment -- Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project -- MTrust: A Reputation-Based Trust Model for a Mobile Agent System -- Ubisafe Computing: Vision and Challenges (I) -- Track 3: Cryptography, Security and Privacy -- Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters -- Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services -- Remote Authentication with Forward Security -- A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization -- An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment -- Efficient Signcryption Without Random Oracles -- Two Novel Packet Marking Schemes for IP Traceback -- A Novel Rate Limit Algorithm Against Meek DDoS Attacks -- Resistance Analysis to Intruders’ Evasion of a Novel Algorithm to Detect Stepping-Stone -- A New ID-Based Broadcast Encryption Scheme -- Automated Abduction for Computer Forensics -- A Framework for Specifying and Managing Security Requirements in Collaborative Systems -- System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks -- On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption -- Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme) -- Track 4: Reliability, Fault Tolerance and Dependable Systems -- A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates -- A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment -- FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS -- Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems -- Active Fault-Tolerant System for Open Distributed Computing -- A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases -- An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Software engineering. 
650 0 |a Operating systems (Computers). 
650 0 |a Data encryption (Computer science). 
650 0 |a Computers. 
650 1 4 |a Computer Science. 
650 2 4 |a Theory of Computation. 
650 2 4 |a Operating Systems. 
650 2 4 |a Software Engineering. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Encryption. 
650 2 4 |a Information Systems Applications (incl. Internet). 
700 1 |a Yang, Laurence T.  |e editor. 
700 1 |a Jin, Hai.  |e editor. 
700 1 |a Ma, Jianhua.  |e editor. 
700 1 |a Ungerer, Theo.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540386193 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 4158 
856 4 0 |u http://dx.doi.org/10.1007/11839569  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)