000 07028nam a22006375i 4500
001 978-3-540-38622-3
003 DE-He213
005 20240730182154.0
007 cr nn 008mamaa
008 100301s2006 gw | s |||| 0|eng d
020 _a9783540386223
_9978-3-540-38622-3
024 7 _a10.1007/11839569
_2doi
050 4 _aQA75.5-76.95
072 7 _aUYA
_2bicssc
072 7 _aCOM014000
_2bisacsh
072 7 _aUYA
_2thema
082 0 4 _a004.0151
_223
245 1 0 _aAutonomic and Trusted Computing
_h[electronic resource] :
_bThird International Conference, ATC 2006, Wuhan, China, September 3-6, 2006 /
_cedited by Laurence T. Yang, Hai Jin, Theo Ungerer.
250 _a1st ed. 2006.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2006.
300 _aXVI, 616 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aProgramming and Software Engineering,
_x2945-9168 ;
_v4158
505 0 _aKeynote Speech -- Emergence in Organic Computing Systems: Discussion of a Controversial Concept -- Managing Trust in Distributed Agent Systems -- Track 1: Autonomic/Organic Computing and Communications -- Towards a Standards-Based Autonomic Context Management System -- Formal Modeling and Verification of Systems with Self-x Properties -- A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems -- Autonomic Interference Avoidance with Extended Shortest Path Algorithm -- Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems -- From Components to Autonomic Elements Using Negotiable Contracts -- Self-configuration Via Cooperative Social Behavior -- Towards Ontology-Based Embedded Services -- TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System -- Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks -- Autonomic Group Location Update for Mobile Networks -- Autonomic and Trusted Computing Paradigms -- Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks -- Self Awareness and Adaptive Traffic Signal Control System for Smart World -- Development and Runtime Support for Situation-Aware Security in Autonomic Computing -- Track 2: Trust Models and Trustworthy Systems/Services -- A Social Network-Based Trust Model for the Semantic Web -- Fuzzy Model Tuning for Intrusion Detection Systems -- PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems -- An Integration Framework for Trustworthy Transactions -- Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology -- Toward Trust Management in Autonomic and Coordination Applications -- Bayesian Network Based Trust Management -- An Improved Global Trust Value Computing Method in P2PSystem -- Trusted Priority Control Design for Information Networks Based on Sociotechnology -- Autonomic Trust Management in a Component Based Software System -- A Risk Assessment Model for Enterprise Network Security -- A Security Management Framework with Roaming Coordinator for Pervasive Services -- A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications -- Automatic Composition of Secure Workflows -- TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting -- A Group Based Reputation System for P2P Networks -- An Approach for Trusted Interoperation in a Multidomain Environment -- Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project -- MTrust: A Reputation-Based Trust Model for a Mobile Agent System -- Ubisafe Computing: Vision and Challenges (I) -- Track 3: Cryptography, Security and Privacy -- Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters -- Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services -- Remote Authentication with Forward Security -- A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization -- An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment -- Efficient Signcryption Without Random Oracles -- Two Novel Packet Marking Schemes for IP Traceback -- A Novel Rate Limit Algorithm Against Meek DDoS Attacks -- Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone -- A New ID-Based Broadcast Encryption Scheme -- Automated Abduction for Computer Forensics -- A Framework for Specifying and Managing Security Requirements in Collaborative Systems -- System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control inLarge-Scale Wireless Sensor Networks -- On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption -- Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme) -- Track 4: Reliability, Fault Tolerance and Dependable Systems -- A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates -- A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment -- FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS -- Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems -- Active Fault-Tolerant System for Open Distributed Computing -- A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases -- An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
650 0 _aComputer science.
_99832
650 0 _aOperating systems (Computers).
_95329
650 0 _aSoftware engineering.
_94138
650 0 _aComputer networks .
_931572
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aApplication software.
_9127404
650 1 4 _aTheory of Computation.
_9127405
650 2 4 _aOperating Systems.
_937074
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aComputer Communication Networks.
_9127406
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer and Information Systems Applications.
_9127407
700 1 _aYang, Laurence T.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9127408
700 1 _aJin, Hai.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_926571
700 1 _aUngerer, Theo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9127409
710 2 _aSpringerLink (Online service)
_9127410
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540386193
776 0 8 _iPrinted edition:
_z9783540828587
830 0 _aProgramming and Software Engineering,
_x2945-9168 ;
_v4158
_9127411
856 4 0 _uhttps://doi.org/10.1007/11839569
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c91252
_d91252