Autonomic and Trusted Computing Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Yang, Laurence T. (Επιμελητής έκδοσης), Jin, Hai (Επιμελητής έκδοσης), Ma, Jianhua (Επιμελητής έκδοσης), Ungerer, Theo (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4158
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Keynote Speech
  • Emergence in Organic Computing Systems: Discussion of a Controversial Concept
  • Managing Trust in Distributed Agent Systems
  • Track 1: Autonomic/Organic Computing and Communications
  • Towards a Standards-Based Autonomic Context Management System
  • Formal Modeling and Verification of Systems with Self-x Properties
  • A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems
  • Autonomic Interference Avoidance with Extended Shortest Path Algorithm
  • Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems
  • From Components to Autonomic Elements Using Negotiable Contracts
  • Self-configuration Via Cooperative Social Behavior
  • Towards Ontology-Based Embedded Services
  • TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System
  • Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks
  • Autonomic Group Location Update for Mobile Networks
  • Autonomic and Trusted Computing Paradigms
  • Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks
  • Self Awareness and Adaptive Traffic Signal Control System for Smart World
  • Development and Runtime Support for Situation-Aware Security in Autonomic Computing
  • Track 2: Trust Models and Trustworthy Systems/Services
  • A Social Network-Based Trust Model for the Semantic Web
  • Fuzzy Model Tuning for Intrusion Detection Systems
  • PATROL-F – A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems
  • An Integration Framework for Trustworthy Transactions
  • Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology
  • Toward Trust Management in Autonomic and Coordination Applications
  • Bayesian Network Based Trust Management
  • An Improved Global Trust Value Computing Method in P2P System
  • Trusted Priority Control Design for Information Networks Based on Sociotechnology
  • Autonomic Trust Management in a Component Based Software System
  • A Risk Assessment Model for Enterprise Network Security
  • A Security Management Framework with Roaming Coordinator for Pervasive Services
  • A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications
  • Automatic Composition of Secure Workflows
  • TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting
  • A Group Based Reputation System for P2P Networks
  • An Approach for Trusted Interoperation in a Multidomain Environment
  • Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project
  • MTrust: A Reputation-Based Trust Model for a Mobile Agent System
  • Ubisafe Computing: Vision and Challenges (I)
  • Track 3: Cryptography, Security and Privacy
  • Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters
  • Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services
  • Remote Authentication with Forward Security
  • A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization
  • An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment
  • Efficient Signcryption Without Random Oracles
  • Two Novel Packet Marking Schemes for IP Traceback
  • A Novel Rate Limit Algorithm Against Meek DDoS Attacks
  • Resistance Analysis to Intruders’ Evasion of a Novel Algorithm to Detect Stepping-Stone
  • A New ID-Based Broadcast Encryption Scheme
  • Automated Abduction for Computer Forensics
  • A Framework for Specifying and Managing Security Requirements in Collaborative Systems
  • System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks
  • On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption
  • Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme)
  • Track 4: Reliability, Fault Tolerance and Dependable Systems
  • A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates
  • A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment
  • FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS
  • Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems
  • Active Fault-Tolerant System for Open Distributed Computing
  • A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases
  • An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.