Autonomic and Trusted Computing Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4158 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Keynote Speech
- Emergence in Organic Computing Systems: Discussion of a Controversial Concept
- Managing Trust in Distributed Agent Systems
- Track 1: Autonomic/Organic Computing and Communications
- Towards a Standards-Based Autonomic Context Management System
- Formal Modeling and Verification of Systems with Self-x Properties
- A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems
- Autonomic Interference Avoidance with Extended Shortest Path Algorithm
- Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems
- From Components to Autonomic Elements Using Negotiable Contracts
- Self-configuration Via Cooperative Social Behavior
- Towards Ontology-Based Embedded Services
- TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System
- Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks
- Autonomic Group Location Update for Mobile Networks
- Autonomic and Trusted Computing Paradigms
- Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks
- Self Awareness and Adaptive Traffic Signal Control System for Smart World
- Development and Runtime Support for Situation-Aware Security in Autonomic Computing
- Track 2: Trust Models and Trustworthy Systems/Services
- A Social Network-Based Trust Model for the Semantic Web
- Fuzzy Model Tuning for Intrusion Detection Systems
- PATROL-F – A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems
- An Integration Framework for Trustworthy Transactions
- Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology
- Toward Trust Management in Autonomic and Coordination Applications
- Bayesian Network Based Trust Management
- An Improved Global Trust Value Computing Method in P2P System
- Trusted Priority Control Design for Information Networks Based on Sociotechnology
- Autonomic Trust Management in a Component Based Software System
- A Risk Assessment Model for Enterprise Network Security
- A Security Management Framework with Roaming Coordinator for Pervasive Services
- A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications
- Automatic Composition of Secure Workflows
- TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting
- A Group Based Reputation System for P2P Networks
- An Approach for Trusted Interoperation in a Multidomain Environment
- Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project
- MTrust: A Reputation-Based Trust Model for a Mobile Agent System
- Ubisafe Computing: Vision and Challenges (I)
- Track 3: Cryptography, Security and Privacy
- Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters
- Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services
- Remote Authentication with Forward Security
- A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization
- An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment
- Efficient Signcryption Without Random Oracles
- Two Novel Packet Marking Schemes for IP Traceback
- A Novel Rate Limit Algorithm Against Meek DDoS Attacks
- Resistance Analysis to Intruders’ Evasion of a Novel Algorithm to Detect Stepping-Stone
- A New ID-Based Broadcast Encryption Scheme
- Automated Abduction for Computer Forensics
- A Framework for Specifying and Managing Security Requirements in Collaborative Systems
- System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks
- On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption
- Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme)
- Track 4: Reliability, Fault Tolerance and Dependable Systems
- A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates
- A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment
- FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS
- Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems
- Active Fault-Tolerant System for Open Distributed Computing
- A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases
- An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.