HOME > Detail View

Detail View

Autonomic and trusted computing : 4th international conference, ATC 2007, Hong Kong, China, July 11-13, 2007 : proceedings

Autonomic and trusted computing : 4th international conference, ATC 2007, Hong Kong, China, July 11-13, 2007 : proceedings (Loan 1 times)

Material type
단행본
Personal Author
Xiao, Bin.
Title Statement
Autonomic and trusted computing : 4th international conference, ATC 2007, Hong Kong, China, July 11-13, 2007 : proceedings / Bin Xiao ... [et al.] (eds.).
Publication, Distribution, etc
Berlin ;   New York :   Springer ,   c2007.  
Physical Medium
xviii, 571 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science ,0302-9743 ; 4610
ISBN
9783540735465 (pbk. : alk. paper) 3540735461 (pbk. : alk. paper)
General Note
International conference proceedings.  
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Autonomic computing -- Congresses. Computer security -- Congresses. Computer networks -- Security measures -- Congresses.
000 01722camuu2200433 a 4500
001 000045561070
005 20091126125305
008 070605s2007 gw a b 101 0 eng d
010 ▼a 2007930223
016 7 ▼a 984556540 ▼2 GyFmDB
020 ▼a 9783540735465 (pbk. : alk. paper)
020 ▼a 3540735461 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm155834291
035 ▼a (OCoLC)155834291
035 ▼a (KERIS)REF000013615804
040 ▼a OHX ▼c OHX ▼d BAKER ▼d CUS ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a QA76.9.A97 ▼b A83 2007
072 7 ▼a QA ▼2 lcco
082 0 0 ▼a 005.8 ▼2 22
082 0 4 ▼a 004 ▼2 22
090 ▼a 004 ▼b A862a ▼c 2007
111 2 ▼a ATC 2007 ▼d (2007 : ▼c Hong Kong, China)
245 1 0 ▼a Autonomic and trusted computing : ▼b 4th international conference, ATC 2007, Hong Kong, China, July 11-13, 2007 : proceedings / ▼c Bin Xiao ... [et al.] (eds.).
246 3 0 ▼a ATC 2007
260 ▼a Berlin ; ▼a New York : ▼b Springer , ▼c c2007.
300 ▼a xviii, 571 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science , ▼x 0302-9743 ; ▼v 4610
490 1 ▼a LNCS sublibrary. SL 2, Programming and software engineering
500 ▼a International conference proceedings.
504 ▼a Includes bibliographical references and index.
650 0 ▼a Autonomic computing ▼v Congresses.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Computer networks ▼x Security measures ▼v Congresses.
700 1 ▼a Xiao, Bin.
830 0 ▼a Lecture notes in computer science ; ▼v 4610.
830 0 ▼a LNCS sublibrary. ▼n SL 2, ▼p Programming and software engineering.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 004 A862a 2007 Accession No. 121186476 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

'Keynote Speech.- An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing.- Remarks on Self-organization and Trust in Organic Computing Systems.- Cryptography and Signatures.- ZigBee Security Using Identity-Based Cryptography.- Efficient Identity-Based Signcryption Scheme for Multiple Receivers.- Identity-Based Proxy Signature from Pairings.- Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.- A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid.- Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.- Autonomic Computing and Services.- Service-Context Knowledge-Based Solution for Autonomic Adaptation.- Middleware Based Context Management for the Component-Based Pervasive Computing.- Building Autonomic and Secure Service Oriented Architectures with MAWeS.- Biology as Inspiration Towards a Novel Service Life-Cycle.- Design of Service-Based Systems with Adaptive Tradeoff Between Security and Service Delay.- Secure and Trusted Computing.- Provably Secure Identity-Based Threshold Unsigncryption Scheme.- Final Fantasy - Securing On-Line Gaming with Trusted Computing.- An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack.- Establishing Trust Between Mail Servers to Improve Spam Filtering.- Autonomic Models and Architectures.- An Architecture for Self-healing Autonomous Object Groups.- A Generic and Modular System Architecture for Trustworthy, Autonomous Applications.- Cooperative Component Testing Architecture in Collaborating Network Environment.- An Approach to a Trustworthy System Architecture Using Virtualization.- Trusted Models and Systems.- CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks.- A Trust Evolution Model for P2P Networks.- An Adaptive Trust Control Model for a Trustworthy Component Software Platform.- Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach.- Intrusion Detection.- An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System.- Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms.- Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System.- Stepping-Stone Detection Via Request-Response Traffic Analysis.- SPA Countermeasure Based on Unsigned Left-to-Right Recodings.- Access Control.- A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block.- Novel Remote User Authentication Scheme Using Bilinear Pairings.- On the Homonymous Role in Role-Based Discretionary Access Control.- Ontology Based Hybrid Access Control for Automatic Interoperation.- Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding.- Trusted Computing and Communications.- A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints.- Formal Analysis of Secure Bootstrap in Trusted Computing.- Calculating Trust Using Aggregation Rules in Social Networks.- Enhancing Grid Security Using Trusted Virtualization.- A Wearable System for Outdoor Running Workout State Recognition and Course Provision.- Key Management.- Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.- Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.- A Secure DRM Framework for User's Domain and Key Management.- A Secret-Key Exponential Key Agreement Protocol with Smart Cards.- Key Establishment Scheme for Sensor Networks with Low Communication Cost.- Worm Detection and Data Security.- A Worm Containment Model Based on Neighbor-Alarm.- A Distributed Self-healing Data Store.- Malicious Codes Detection Based on Ensemble Learning.- Generating Simplified Regul


Information Provided By: : Aladin

New Arrivals Books in Related Fields

김종원 (2020)
김자미 (2021)