Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings /
Corporate Author: | |
---|---|
Other Authors: | , , , |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edition: | 1st ed. 2007. |
Series: | Programming and Software Engineering ;
4610 |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-3-540-73547-2 |
Table of Contents:
- Keynote Speech
- An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing
- Remarks on Self-organization and Trust in Organic Computing Systems
- Cryptography and Signatures
- ZigBee Security Using Identity-Based Cryptography
- Efficient Identity-Based Signcryption Scheme for Multiple Receivers
- Identity-Based Proxy Signature from Pairings
- Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection
- A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid
- Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005
- Autonomic Computing and Services
- Service-Context Knowledge-Based Solution for Autonomic Adaptation
- Middleware Based Context Management for the Component-Based Pervasive Computing
- Building Autonomic and Secure Service Oriented Architectures with MAWeS
- Biology as Inspiration Towards a Novel Service Life-Cycle
- Design of Service–Based Systems with Adaptive Tradeoff Between Security and Service Delay
- Secure and Trusted Computing
- Provably Secure Identity-Based Threshold Unsigncryption Scheme
- Final Fantasy – Securing On-Line Gaming with Trusted Computing
- An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack
- Establishing Trust Between Mail Servers to Improve Spam Filtering
- Autonomic Models and Architectures
- An Architecture for Self-healing Autonomous Object Groups
- A Generic and Modular System Architecture for Trustworthy, Autonomous Applications
- Cooperative Component Testing Architecture in Collaborating Network Environment
- An Approach to a Trustworthy System Architecture Using Virtualization
- Trusted Models and Systems
- CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks
- A Trust Evolution Model for P2P Networks
- An Adaptive Trust Control Model for a Trustworthy Component Software Platform
- Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach
- Intrusion Detection
- An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System
- Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms
- Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System
- Stepping-Stone Detection Via Request-Response Traffic Analysis
- SPA Countermeasure Based on Unsigned Left-to-Right Recodings
- Access Control
- A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block
- Novel Remote User Authentication Scheme Using Bilinear Pairings
- On the Homonymous Role in Role-Based Discretionary Access Control
- Ontology Based Hybrid Access Control for Automatic Interoperation
- Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding
- Trusted Computing and Communications
- A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints
- Formal Analysis of Secure Bootstrap in Trusted Computing
- Calculating Trust Using Aggregation Rules in Social Networks
- Enhancing Grid Security Using Trusted Virtualization
- A Wearable System for Outdoor Running Workout State Recognition and Course Provision
- Key Management
- Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
- Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing
- A Secure DRM Framework for User’s Domain and Key Management
- A Secret-Key Exponential Key Agreement Protocol with Smart Cards
- Key Establishment Scheme for Sensor Networks with Low Communication Cost
- Worm Detection and Data Security
- A Worm Containment Model Based on Neighbor-Alarm
- A Distributed Self-healing Data Store
- Malicious Codes Detection Based on Ensemble Learning
- Generating Simplified Regular Expression Signatures for Polymorphic Worms
- Secured Services and Applications
- AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks
- A Prediction-Based Fair Replication Algorithm in Structured P2P Systems
- TransCom: A Virtual Disk Based Self-management System
- Defending Against Jamming Attacks in Wireless Local Area Networks
- Fault-Tolerant Systems
- Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels
- A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection
- A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling
- An Enhanced DGIDE Platform for Intrusion Detection.