000 | 07028nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-540-38622-3 | ||
003 | DE-He213 | ||
005 | 20240730182154.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2006 gw | s |||| 0|eng d | ||
020 |
_a9783540386223 _9978-3-540-38622-3 |
||
024 | 7 |
_a10.1007/11839569 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUYA _2bicssc |
|
072 | 7 |
_aCOM014000 _2bisacsh |
|
072 | 7 |
_aUYA _2thema |
|
082 | 0 | 4 |
_a004.0151 _223 |
245 | 1 | 0 |
_aAutonomic and Trusted Computing _h[electronic resource] : _bThird International Conference, ATC 2006, Wuhan, China, September 3-6, 2006 / _cedited by Laurence T. Yang, Hai Jin, Theo Ungerer. |
250 | _a1st ed. 2006. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2006. |
|
300 |
_aXVI, 616 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aProgramming and Software Engineering, _x2945-9168 ; _v4158 |
|
505 | 0 | _aKeynote Speech -- Emergence in Organic Computing Systems: Discussion of a Controversial Concept -- Managing Trust in Distributed Agent Systems -- Track 1: Autonomic/Organic Computing and Communications -- Towards a Standards-Based Autonomic Context Management System -- Formal Modeling and Verification of Systems with Self-x Properties -- A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems -- Autonomic Interference Avoidance with Extended Shortest Path Algorithm -- Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems -- From Components to Autonomic Elements Using Negotiable Contracts -- Self-configuration Via Cooperative Social Behavior -- Towards Ontology-Based Embedded Services -- TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System -- Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks -- Autonomic Group Location Update for Mobile Networks -- Autonomic and Trusted Computing Paradigms -- Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks -- Self Awareness and Adaptive Traffic Signal Control System for Smart World -- Development and Runtime Support for Situation-Aware Security in Autonomic Computing -- Track 2: Trust Models and Trustworthy Systems/Services -- A Social Network-Based Trust Model for the Semantic Web -- Fuzzy Model Tuning for Intrusion Detection Systems -- PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems -- An Integration Framework for Trustworthy Transactions -- Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology -- Toward Trust Management in Autonomic and Coordination Applications -- Bayesian Network Based Trust Management -- An Improved Global Trust Value Computing Method in P2PSystem -- Trusted Priority Control Design for Information Networks Based on Sociotechnology -- Autonomic Trust Management in a Component Based Software System -- A Risk Assessment Model for Enterprise Network Security -- A Security Management Framework with Roaming Coordinator for Pervasive Services -- A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications -- Automatic Composition of Secure Workflows -- TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting -- A Group Based Reputation System for P2P Networks -- An Approach for Trusted Interoperation in a Multidomain Environment -- Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project -- MTrust: A Reputation-Based Trust Model for a Mobile Agent System -- Ubisafe Computing: Vision and Challenges (I) -- Track 3: Cryptography, Security and Privacy -- Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters -- Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services -- Remote Authentication with Forward Security -- A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization -- An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment -- Efficient Signcryption Without Random Oracles -- Two Novel Packet Marking Schemes for IP Traceback -- A Novel Rate Limit Algorithm Against Meek DDoS Attacks -- Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone -- A New ID-Based Broadcast Encryption Scheme -- Automated Abduction for Computer Forensics -- A Framework for Specifying and Managing Security Requirements in Collaborative Systems -- System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control inLarge-Scale Wireless Sensor Networks -- On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption -- Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme) -- Track 4: Reliability, Fault Tolerance and Dependable Systems -- A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates -- A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment -- FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS -- Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems -- Active Fault-Tolerant System for Open Distributed Computing -- A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases -- An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. | |
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aOperating systems (Computers). _95329 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aApplication software. _9127404 |
|
650 | 1 | 4 |
_aTheory of Computation. _9127405 |
650 | 2 | 4 |
_aOperating Systems. _937074 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aComputer Communication Networks. _9127406 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9127407 |
700 | 1 |
_aYang, Laurence T. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9127408 |
|
700 | 1 |
_aJin, Hai. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _926571 |
|
700 | 1 |
_aUngerer, Theo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9127409 |
|
710 | 2 |
_aSpringerLink (Online service) _9127410 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540386193 |
776 | 0 | 8 |
_iPrinted edition: _z9783540828587 |
830 | 0 |
_aProgramming and Software Engineering, _x2945-9168 ; _v4158 _9127411 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/11839569 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c91252 _d91252 |