Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings /

Corporate Author: SpringerLink (Online service)
Other Authors: Xiao, Bin. (Editor, http://id.loc.gov/vocabulary/relators/edt), Yang, Laurence T. (Editor, http://id.loc.gov/vocabulary/relators/edt), Muller-Schloer, Christian. (Editor, http://id.loc.gov/vocabulary/relators/edt), Hua, Yu. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edition:1st ed. 2007.
Series:Programming and Software Engineering ; 4610
Subjects:
Online Access:https://doi.org/10.1007/978-3-540-73547-2
LEADER 07614nam a22006375i 4500
001 978-3-540-73547-2
003 DE-He213
005 20210624214508.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 |a 9783540735472  |9 978-3-540-73547-2 
024 7 |a 10.1007/978-3-540-73547-2  |2 doi 
050 4 |a QA75.5-76.95 
050 4 |a QA76.63 
072 7 |a UY  |2 bicssc 
072 7 |a COM014000  |2 bisacsh 
072 7 |a UY  |2 thema 
072 7 |a UYA  |2 thema 
082 0 4 |a 004.0151  |2 23 
245 1 0 |a Autonomic and Trusted Computing  |h [electronic resource] :  |b 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings /  |c edited by Bin Xiao, Laurence T. Yang, Christian Muller-Schloer, Yu Hua. 
250 |a 1st ed. 2007. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2007. 
300 |a XVIII, 574 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Programming and Software Engineering ;  |v 4610 
505 0 |a Keynote Speech -- An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing -- Remarks on Self-organization and Trust in Organic Computing Systems -- Cryptography and Signatures -- ZigBee Security Using Identity-Based Cryptography -- Efficient Identity-Based Signcryption Scheme for Multiple Receivers -- Identity-Based Proxy Signature from Pairings -- Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection -- A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid -- Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005 -- Autonomic Computing and Services -- Service-Context Knowledge-Based Solution for Autonomic Adaptation -- Middleware Based Context Management for the Component-Based Pervasive Computing -- Building Autonomic and Secure Service Oriented Architectures with MAWeS -- Biology as Inspiration Towards a Novel Service Life-Cycle -- Design of Service–Based Systems with Adaptive Tradeoff Between Security and Service Delay -- Secure and Trusted Computing -- Provably Secure Identity-Based Threshold Unsigncryption Scheme -- Final Fantasy – Securing On-Line Gaming with Trusted Computing -- An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack -- Establishing Trust Between Mail Servers to Improve Spam Filtering -- Autonomic Models and Architectures -- An Architecture for Self-healing Autonomous Object Groups -- A Generic and Modular System Architecture for Trustworthy, Autonomous Applications -- Cooperative Component Testing Architecture in Collaborating Network Environment -- An Approach to a Trustworthy System Architecture Using Virtualization -- Trusted Models and Systems -- CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks -- A Trust Evolution Model for P2P Networks -- An Adaptive Trust Control Model for a Trustworthy Component Software Platform -- Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach -- Intrusion Detection -- An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System -- Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms -- Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System -- Stepping-Stone Detection Via Request-Response Traffic Analysis -- SPA Countermeasure Based on Unsigned Left-to-Right Recodings -- Access Control -- A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block -- Novel Remote User Authentication Scheme Using Bilinear Pairings -- On the Homonymous Role in Role-Based Discretionary Access Control -- Ontology Based Hybrid Access Control for Automatic Interoperation -- Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding -- Trusted Computing and Communications -- A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints -- Formal Analysis of Secure Bootstrap in Trusted Computing -- Calculating Trust Using Aggregation Rules in Social Networks -- Enhancing Grid Security Using Trusted Virtualization -- A Wearable System for Outdoor Running Workout State Recognition and Course Provision -- Key Management -- Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust -- Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing -- A Secure DRM Framework for User’s Domain and Key Management -- A Secret-Key Exponential Key Agreement Protocol with Smart Cards -- Key Establishment Scheme for Sensor Networks with Low Communication Cost -- Worm Detection and Data Security -- A Worm Containment Model Based on Neighbor-Alarm -- A Distributed Self-healing Data Store -- Malicious Codes Detection Based on Ensemble Learning -- Generating Simplified Regular Expression Signatures for Polymorphic Worms -- Secured Services and Applications -- AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks -- A Prediction-Based Fair Replication Algorithm in Structured P2P Systems -- TransCom: A Virtual Disk Based Self-management System -- Defending Against Jamming Attacks in Wireless Local Area Networks -- Fault-Tolerant Systems -- Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels -- A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection -- A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling -- An Enhanced DGIDE Platform for Intrusion Detection. 
650 0 |a Computers. 
650 0 |a Computer security. 
650 0 |a Software engineering. 
650 0 |a Computer communication systems. 
650 0 |a Data encryption (Computer science). 
650 0 |a Application software. 
650 1 4 |a Theory of Computation.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I16005 
650 2 4 |a Systems and Data Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 
650 2 4 |a Software Engineering.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I14029 
650 2 4 |a Computer Communication Networks.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022 
650 2 4 |a Cryptology.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020 
650 2 4 |a Information Systems Applications (incl. Internet).  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I18040 
700 1 |a Xiao, Bin.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Yang, Laurence T.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Muller-Schloer, Christian.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Hua, Yu.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783540840787 
776 0 8 |i Printed edition:  |z 9783540735465 
830 0 |a Programming and Software Engineering ;  |v 4610 
856 4 0 |u https://doi.org/10.1007/978-3-540-73547-2 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)