default search action
ATC 2006: Wuhan, China
- Laurence Tianruo Yang, Hai Jin, Jianhua Ma, Theo Ungerer:
Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings. Lecture Notes in Computer Science 4158, Springer 2006, ISBN 3-540-38619-X
Keynote Speech
- Christian Müller-Schloer, Bernhard Sick:
Emergence in Organic Computing Systems: Discussion of a Controversial Concept. 1-16 - Stephen S. Yau:
Managing Trust in Distributed Agent Systems. 17-25
Autonomic/Organic Computing and Communications
- Jadwiga Indulska, Karen Henricksen, Peizhao Hu:
Towards a Standards-Based Autonomic Context Management System. 26-37 - Matthias Güdemann, Frank Ortmeier, Wolfgang Reif:
Formal Modeling and Verification of Systems with Self-x Properties. 38-47 - Junaid Ahsenali Chaudhry, Seungkyu Park:
A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems. 48-56 - Yong Cui, Hao Che, Constantino M. Lagoa, ZhiMei Zheng:
Autonomic Interference Avoidance with Extended Shortest Path Algorithm. 57-66 - A. Reza Haydarlou, Benno J. Overeinder, Michel A. Oey, Frances M. T. Brazier:
Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems. 67-77 - Hervé Chang, Philippe Collet, Alain Ozanne, Nicolas Rivierre:
From Components to Autonomic Elements Using Negotiable Contracts. 78-89 - Wolfgang Trumler, Robert Klaus, Theo Ungerer:
Self-configuration Via Cooperative Social Behavior. 90-99 - Ghadi Mahmoudi, Christian Müller-Schloer:
Towards Ontology-Based Embedded Services. 100-112 - Sirui Yang, Hai Jin, Xuping Tu:
TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System. 113-122 - Yanxiang He, Jun Xiao, Naixue Xiong, Laurence Tianruo Yang:
Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks. 123-132 - Lai Tu, Furong Wang, Fan Zhang, Jian Zhang:
Autonomic Group Location Update for Mobile Networks. 133-142 - Xiaolin Li, Hui Kang, Patrick Harrington, Johnson Thomas:
Autonomic and Trusted Computing Paradigms. 143-152 - Khaled Ragab, Akinori Yonezawa:
Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks. 153-162 - Lawrence Y. Deng, Dong-Liang Lee:
Self Awareness and Adaptive Traffic Signal Control System for Smart World. 163-172 - Stephen S. Yau, Yisheng Yao, Min Yan:
Development and Runtime Support for Situation-Aware Security in Autonomic Computing. 173-182
Trust Models and Trustworthy Systems/Services
- Yu Zhang, Huajun Chen, Zhaohui Wu:
A Social Network-Based Trust Model for the Semantic Web. 183-192 - Zhenwei Yu, Jeffrey J. P. Tsai:
Fuzzy Model Tuning for Intrusion Detection Systems. 193-204 - Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Hassan Artail:
PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems. 205-216 - Yonghwan Lee, Dugki Min:
An Integration Framework for Trustworthy Transactions. 217-226 - Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou:
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. 227-235 - Yuan Wang, Feng Xu, Ye Tao, Chun Cao, Jian Lü:
Toward Trust Management in Autonomic and Coordination Applications. 236-245 - Yong Wang, Vinny Cahill, Elizabeth Gray, Colin Harris, Lejian Liao:
Bayesian Network Based Trust Management. 246-257 - Fajiang Yu, Huanguo Zhang, Fei Yan, Song Gao:
An Improved Global Trust Value Computing Method in P2P System. 258-267 - Noriaki Yoshikai:
Trusted Priority Control Design for Information Networks Based on Sociotechnology. 268-278 - Zheng Yan, Ronan MacLaverty:
Autonomic Trust Management in a Component Based Software System. 279-292 - Fu-Hong Yang, Chi-Hung Chi, Lin Liu:
A Risk Assessment Model for Enterprise Network Security. 293-301 - Minsoo Lee, Sehyun Park, Sungik Jun:
A Security Management Framework with Roaming Coordinator for Pervasive Services. 302-311 - Chenlin Huang, Huaping Hu, Zhiying Wang:
A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications. 312-321 - Marc Lelarge, Zhen Liu, Anton Riabov:
Automatic Composition of Secure Workflows. 322-331 - Yun Tang, Lifeng Sun, Jian-Guang Luo, Shiqiang Yang, Yuzhuo Zhong:
TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting. 332-341 - Huirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng:
A Group Based Reputation System for P2P Networks. 342-351 - Yuqing Sun, Peng Pan, Xiangxu Meng:
An Approach for Trusted Interoperation in a Multidomain Environment. 352-361 - Pierpaolo Dondio, Stephen Barrett, Stefan Weber, Jean-Marc Seigneur:
Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project. 362-373 - Suphithat Songsiri:
MTrust: A Reputation-Based Trust Model for a Mobile Agent System. 374-385 - Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde Cheng, Laurence Tianruo Yang, Runhe Huang, Qun Jin:
Ubisafe Computing: Vision and Challenges (I). 386-397
Cryptography, Security and Privacy
- Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li:
Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. 398-407 - Xiaowen Chu, Yixin Jiang, Chuang Lin, Fujun Feng:
Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. 408-417 - Zhenchuan Chai, Zhenfu Cao, Rongxing Lu:
Remote Authentication with Forward Security. 418-427 - Laurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn:
A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization. 428-438 - Hong Zhu, Sujuan Duan, Fan Hong, Kevin Lü:
An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment. 439-448 - Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang:
Efficient Signcryption Without Random Oracles. 449-458 - Hanping Hu, Yi Wang, Lingfei Wang, Wenxuan Guo, Mingyue Ding:
Two Novel Packet Marking Schemes for IP Traceback. 459-466 - Yinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang:
A Novel Rate Limit Algorithm Against Meek DDoS Attacks. 467-476 - Yongzhong Zhang, Jianhua Yang, Chunming Ye:
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. 477-486 - Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang:
A New ID-Based Broadcast Encryption Scheme. 487-492 - Andrei Doncescu, Katsumi Inoue:
Automated Abduction for Computer Forensics. 493-499 - Stephen S. Yau, Zhaoji Chen:
A Framework for Specifying and Managing Security Requirements in Collaborative Systems. 500-510 - Won Jay Song, Im Sook Há, Mun Kee Choi:
System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks. 511-520 - Christian Veigner, Chunming Rong:
On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. 521-530 - Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang:
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). 531-540
Reliability, Fault Tolerance and Dependable Systems
- Ming Li, Shengquan Wang, Wei Zhao:
A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates. 541-550 - Yun-Long Sie, Te-Hua Wang, Hsuan-Pu Chang, Shu-Nu Chang, Timothy K. Shih:
A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment. 551-560 - Jae-Woo Chang, Young-Chang Kim:
FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS. 561-570 - Wei Luo, Fumin Yang, Liping Pang, Xiao Qin:
Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems. 571-580 - Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida:
Active Fault-Tolerant System for Open Distributed Computing. 581-590 - Yingyuan Xiao, Yunsheng Liu, Xiangyang Chen, Xiaofeng Liu:
A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases. 591-600 - Iuon-Chang Lin, Chin-Chen Chang:
An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. 601-610
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.