000 06468nam a22006975i 4500
001 978-3-642-16576-4
003 DE-He213
005 20240730204102.0
007 cr nn 008mamaa
008 101030s2010 gw | s |||| 0|eng d
020 _a9783642165764
_9978-3-642-16576-4
024 7 _a10.1007/978-3-642-16576-4
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aAutonomic and Trusted Computing
_h[electronic resource] :
_b7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings /
_cedited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aXVII, 328 p. 112 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aProgramming and Software Engineering,
_x2945-9168 ;
_v6407
505 0 _aAutonomic and Organic Computing -- Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras -- A Formal Framework for Compositional Verification of Organic Computing Systems -- On-Line Adaptive Algorithms in Autonomic Restart Control -- Designing Self-healing in Automotive Systems -- Trustworthy Organic Computing Systems: Challenges and Perspectives -- AC/OC Network and Protocol -- Adaptive Control of Sensor Networks -- Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile Application Usage -- Context Based Trust Normalization in Service-Oriented Environments -- A Framework for Trust Enabled Software Asset Retrieval -- Opportunistic Trust Based P2P Services Framework for Disconnected MANETs -- A Risk-Aware Resource Service Decision Strategy for Global Computing -- Trustworthy Computing -- Message Race Detection for Web Services by an SMT-Based Analysis -- A User-Oriented Approach to Assessing Web Service Trustworthiness -- Improving the Trustworthiness of Service QoS Information in Service-Based Systems -- Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software -- The Testing Method for Interface Customized Component -- Trust-Related Security -- A New Monitor Model for Enhancing Trust-Based Systems -- Design and Analysis of "Flexible" k-out-of-n Signatures -- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints -- Invited Session -- Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture -- Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace -- On Alleviating Reader Collisions Towards High Efficient RFID Systems.
520 _aComputing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems--as well as services--available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), heldin Xi'an, China, October 26-29, 2010.
650 0 _aData protection.
_97245
650 0 _aSoftware engineering.
_94138
650 0 _aComputer networks .
_931572
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aApplication software.
_9178043
650 0 _aElectronic data processing
_xManagement.
_9178044
650 1 4 _aData and Information Security.
_931990
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aComputer Communication Networks.
_9178045
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer and Information Systems Applications.
_9178046
650 2 4 _aIT Operations.
_931703
700 1 _aXie, Bing.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9178047
700 1 _aBranke, Juergen.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9178048
700 1 _aSadjadi, S. Masoud.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9178049
700 1 _aZhang, Daqing.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9178050
700 1 _aZhou, Xingshe.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9178051
710 2 _aSpringerLink (Online service)
_9178052
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642165757
776 0 8 _iPrinted edition:
_z9783642165771
830 0 _aProgramming and Software Engineering,
_x2945-9168 ;
_v6407
_9178053
856 4 0 _uhttps://doi.org/10.1007/978-3-642-16576-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c97699
_d97699