default search action
ATC 2008: Oslo, Norway
- Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang, Jianhua Ma:
Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings. Lecture Notes in Computer Science 5060, Springer 2008, ISBN 978-3-540-69294-2
Keynote Speech
- Erdal Cayirci:
Sensor Network Applications Implemented by Industry and Their Security Challenges. 1
Regular Papers
Intrusion Detection
- Jianhua Yang, Byong Lee:
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. 2-12 - Jun Yang, Ying Li, Benxiong Huang, Jiuqiang Ming:
Preventing DDoS Attacks Based on Credit Model for P2P Streaming System. 13-20 - Karl-André Skevik, Vera Goebel, Thomas Plagemann:
Design, Prototype, and Evaluation of a Network Monitoring Library. 21-35 - Gaeil An, Kiyoung Kim:
Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN. 36-46
Trust
- Mohsen Taherian, Rasool Jalili, Morteza Amini:
A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments. 47-59 - Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer:
Using Automated Planning for Trusted Self-organising Organic Computing Systems. 60-72 - Deqing Zou, Yunfa Li, Song Wu, Weizhong Qiang:
A Trusted Group Signature Architecture in Virtual Computing Environment. 73-85 - Xiaowei Chen, Kaiyong Zhao, Xiaowen Chu:
SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks. 86-99
Trusted Systems and Crypto
- Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi:
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. 100-105 - Zhijun Wang, Hao Che, Jiannong Cao:
An Integrated Solution for Policy Filtering and Traffic Anomaly Detection. 106-120 - Martin Gilje Jaatun, Tor Olav Grøtan, Maria B. Line:
Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations. 121-133 - Zhengxin Lu, Chen Huang, Furong Wang, Chunming Rong:
SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. 134-148
Autonomic Computing
- Terry Tidwell, Robert Glaubius, Christopher D. Gill, William D. Smart:
Scheduling for Reliable Execution in Autonomic Systems. 149-161 - Christoph Dorn, Hong Linh Truong, Schahram Dustdar:
Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation. 162-176 - Bojan Jakimovski, Erik Maehle:
Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots. 177-190 - Yingni She, Ho-fung Leung:
Maximising Personal Utility Using Intelligent Strategy in Minority Game. 191-205
Organic Computing
- Hiroyuki Eto, Tadashi Dohi, Jianhua Ma:
Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation. 206-218 - Holger Prothmann, Fabian Rochner, Sven Tomforde, Jürgen Branke, Christian Müller-Schloer, Hartmut Schmeck:
Organic Control of Traffic Lights. 219-233 - Daniel Ziener, Jürgen Teich:
Concepts for Autonomous Control Flow Checking for Embedded CPUs. 234-248
Knowledge and Patterns
- Kieran Greer, Matthias Baumgarten, Chris D. Nugent, Maurice D. Mulvenna, Kevin Curran:
Autonomous Querying for Knowledge Networks. 249-263 - Juryon Paik, Junghyun Nam, Hee Yong Youn, Ung-Mo Kim:
Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database. 264-278
Pervasive Systems
- Furong Wang, Yipeng Qu, Baoming Bai, Fan Zhang, Chen Huang:
Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network. 279-288 - Hadi Hemmati, Rasool Jalili:
Self-reconfiguration in Highly Available Pervasive Computing Systems. 289-301 - Sirui Yang, Hai Jin, Xiaofei Liao, Sanmin Liu:
Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. 302-315 - Mike Hinchey, Emil Vassev:
An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL. 316-330
Special Session Papers
Organic Computing
- Steffen Stein, Rolf Ernst:
Distributed Performance Control in Organic Embedded Systems. 331-342 - Florian Kluge, Jörg Mische, Sascha Uhrig, Theo Ungerer:
An Operating System Architecture for Organic Computing in Embedded Real-Time Systems. 343-357 - Reinhard Mörgenthaler, Markus Zeller, Josef Jiru:
Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks. 358-372 - Paul Ward, Mariusz Pelc, James Hawthorne, Richard John Anthony:
Embedding Dynamic Behaviour into a Self-configuring Software System. 373-387 - Yi-Chih Tung, Chien-Min Ou, Wen-Jyi Hwang, Wei-De Wu:
Service Discovery of IP Cameras Using SIP and Zeroconf Protocols. 388-402 - Alberto Caballero, Juan A. Botía, Antonio Fernandez Gómez-Skarmeta:
Adaptability of the TRSIM Model to Some Changes in Agents Behaviour. 403-417
Trust
- Peter Shaw, Paul Sage, Peter Milligan:
Trusting Groups in Coalition Formation Using Social Distance. 418-428 - Maryna Komarova, Michel Riguidel:
Adjustable Trust Model for Access Control. 429-443 - Chunmei Gui, Quanyuan Wu, Huaimin Wang, Jian Qiang:
Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering. 444-454 - Zheng Yan, Valtteri Niemi, Yan Dong, Guoliang Yu:
A User Behavior Based Trust Model for Mobile Applications. 455-469 - Christoffer Norvik, John P. Morrison, Dan C. Marinescu, Chen Yu, Gabriela M. Marinescu, Howard Jay Siegel:
Managing Contracts in Pleiades Using Trust Management. 470-480
Trust and Dependable Systems
- Stefano Bistarelli, Fabio Martinelli, Francesco Santini:
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily. 481-495 - Hein Meling:
Annotation Markers for Runtime Replication Protocol Selection. 496-506 - Eun-Jun Yoon, Kee-Young Yoo:
Enhanced Three-Round Smart Card-Based Key Exchange Protocol. 507-515 - Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments. 516-526 - Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Stig Ole Johnsen, Irene Wærø, Odd Helge Longva, Inger Anne Tøndel:
A Study of Information Security Practice in a Critical Infrastructure Application. 527-539 - Junze Wang, Yijun Mo, Benxiong Huang, Jie Wen, Li He:
Web Search Results Clustering Based on a Novel Suffix Tree Structure. 540-554
Routing and Reliable Systems
- Tao Yang, Ye Huang, Jianxin Chen, Geng Yang, Chunming Rong:
Di-GAFR: Directed Greedy Adaptive Face-Based Routing. 555-566 - Ning Hu, Peng Zou, Peidong Zhu, Xin Liu:
Cooperative Management Framework for Inter-domain Routing System. 567-576 - Shunshan Piao, Jeongmin Park, Eunseok Lee:
Performance Problem Determination Using Combined Dependency Analysis for Reliable System. 577-587 - Xiaogang Wang, Darren Xu, Junzhou Luo:
A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards. 588-602 - Armando Astarloa, Unai Bidarte, Jaime Jimenez, Jesús Lázaro, Iñigo Martínez de Alegría:
Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes. 603-614
Special Session on Sensor Networks, VoIP, and Watermarking
- Yue-Shan Chang, Tong-Ying Juang, Chen-Yi Su:
Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems. 615-628 - Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, Bin-Yuan Huang:
A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter. 629-640 - Lin-Huang Chang, Chun-Hui Sung, Shih-Yi Chiu, Jiun-Jian Liaw:
Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server. 641-654 - Hung-Chi Chu, Yi-Ting Hsu, Yong-Hsun Lai:
A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks. 655-663
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.