


default search action
ATC 2006: Wuhan, China
- Laurence Tianruo Yang, Hai Jin, Jianhua Ma, Theo Ungerer:

Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings. Lecture Notes in Computer Science 4158, Springer 2006, ISBN 3-540-38619-X
Keynote Speech
- Christian Müller-Schloer, Bernhard Sick

:
Emergence in Organic Computing Systems: Discussion of a Controversial Concept. 1-16 - Stephen S. Yau:

Managing Trust in Distributed Agent Systems. 17-25
Autonomic/Organic Computing and Communications
- Jadwiga Indulska

, Karen Henricksen, Peizhao Hu:
Towards a Standards-Based Autonomic Context Management System. 26-37 - Matthias Güdemann

, Frank Ortmeier, Wolfgang Reif:
Formal Modeling and Verification of Systems with Self-x Properties. 38-47 - Junaid Ahsenali Chaudhry, Seungkyu Park:

A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems. 48-56 - Yong Cui, Hao Che, Constantino M. Lagoa

, ZhiMei Zheng:
Autonomic Interference Avoidance with Extended Shortest Path Algorithm. 57-66 - A. Reza Haydarlou, Benno J. Overeinder, Michel A. Oey, Frances M. T. Brazier:

Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems. 67-77 - Hervé Chang, Philippe Collet, Alain Ozanne, Nicolas Rivierre:

From Components to Autonomic Elements Using Negotiable Contracts. 78-89 - Wolfgang Trumler, Robert Klaus, Theo Ungerer:

Self-configuration Via Cooperative Social Behavior. 90-99 - Ghadi Mahmoudi, Christian Müller-Schloer:

Towards Ontology-Based Embedded Services. 100-112 - Sirui Yang, Hai Jin, Xuping Tu:

TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System. 113-122 - Yanxiang He, Jun Xiao, Naixue Xiong, Laurence Tianruo Yang:

Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks. 123-132 - Lai Tu, Furong Wang, Fan Zhang, Jian Zhang:

Autonomic Group Location Update for Mobile Networks. 133-142 - Xiaolin Li, Hui Kang, Patrick Harrington, Johnson Thomas:

Autonomic and Trusted Computing Paradigms. 143-152 - Khaled Ragab

, Akinori Yonezawa:
Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks. 153-162 - Lawrence Y. Deng, Dong-Liang Lee:

Self Awareness and Adaptive Traffic Signal Control System for Smart World. 163-172 - Stephen S. Yau, Yisheng Yao, Min Yan:

Development and Runtime Support for Situation-Aware Security in Autonomic Computing. 173-182
Trust Models and Trustworthy Systems/Services
- Yu Zhang, Huajun Chen, Zhaohui Wu:

A Social Network-Based Trust Model for the Semantic Web. 183-192 - Zhenwei Yu, Jeffrey J. P. Tsai:

Fuzzy Model Tuning for Intrusion Detection Systems. 193-204 - Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab

, Hassan Artail:
PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems. 205-216 - Yonghwan Lee, Dugki Min:

An Integration Framework for Trustworthy Transactions. 217-226 - Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou:

Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. 227-235 - Yuan Wang, Feng Xu, Ye Tao, Chun Cao, Jian Lü:

Toward Trust Management in Autonomic and Coordination Applications. 236-245 - Yong Wang, Vinny Cahill, Elizabeth Gray, Colin Harris, Lejian Liao:

Bayesian Network Based Trust Management. 246-257 - Fajiang Yu, Huanguo Zhang, Fei Yan, Song Gao:

An Improved Global Trust Value Computing Method in P2P System. 258-267 - Noriaki Yoshikai:

Trusted Priority Control Design for Information Networks Based on Sociotechnology. 268-278 - Zheng Yan

, Ronan MacLaverty:
Autonomic Trust Management in a Component Based Software System. 279-292 - Fu-Hong Yang, Chi-Hung Chi, Lin Liu:

A Risk Assessment Model for Enterprise Network Security. 293-301 - Minsoo Lee, Sehyun Park, Sungik Jun:

A Security Management Framework with Roaming Coordinator for Pervasive Services. 302-311 - Chenlin Huang, Huaping Hu, Zhiying Wang:

A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications. 312-321 - Marc Lelarge, Zhen Liu, Anton Riabov:

Automatic Composition of Secure Workflows. 322-331 - Yun Tang, Lifeng Sun, Jian-Guang Luo, Shiqiang Yang, Yuzhuo Zhong:

TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting. 332-341 - Huirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng:

A Group Based Reputation System for P2P Networks. 342-351 - Yuqing Sun, Peng Pan, Xiangxu Meng:

An Approach for Trusted Interoperation in a Multidomain Environment. 352-361 - Pierpaolo Dondio, Stephen Barrett, Stefan Weber, Jean-Marc Seigneur

:
Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project. 362-373 - Suphithat Songsiri:

MTrust: A Reputation-Based Trust Model for a Mobile Agent System. 374-385 - Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde Cheng, Laurence Tianruo Yang, Runhe Huang, Qun Jin:

Ubisafe Computing: Vision and Challenges (I). 386-397
Cryptography, Security and Privacy
- Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li:

Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. 398-407 - Xiaowen Chu

, Yixin Jiang, Chuang Lin, Fujun Feng:
Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. 408-417 - Zhenchuan Chai, Zhenfu Cao

, Rongxing Lu:
Remote Authentication with Forward Security. 418-427 - Laurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn:

A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization. 428-438 - Hong Zhu, Sujuan Duan, Fan Hong, Kevin Lü:

An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment. 439-448 - Qianhong Wu, Yi Mu, Willy Susilo

, Fangguo Zhang
:
Efficient Signcryption Without Random Oracles. 449-458 - Hanping Hu, Yi Wang, Lingfei Wang, Wenxuan Guo, Mingyue Ding:

Two Novel Packet Marking Schemes for IP Traceback. 459-466 - Yinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang:

A Novel Rate Limit Algorithm Against Meek DDoS Attacks. 467-476 - Yongzhong Zhang, Jianhua Yang, Chunming Ye:

Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. 477-486 - Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang:

A New ID-Based Broadcast Encryption Scheme. 487-492 - Andrei Doncescu, Katsumi Inoue:

Automated Abduction for Computer Forensics. 493-499 - Stephen S. Yau, Zhaoji Chen:

A Framework for Specifying and Managing Security Requirements in Collaborative Systems. 500-510 - Won Jay Song, Im Sook Há, Mun Kee Choi:

System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks. 511-520 - Christian Veigner, Chunming Rong:

On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. 521-530 - Bo Qin, Qianhong Wu, Willy Susilo

, Yi Mu, Yumin Wang:
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme). 531-540
Reliability, Fault Tolerance and Dependable Systems
- Ming Li, Shengquan Wang, Wei Zhao

:
A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates. 541-550 - Yun-Long Sie, Te-Hua Wang, Hsuan-Pu Chang, Shu-Nu Chang, Timothy K. Shih:

A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment. 551-560 - Jae-Woo Chang, Young-Chang Kim:

FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS. 561-570 - Wei Luo

, Fumin Yang, Liping Pang, Xiao Qin
:
Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems. 571-580 - Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida:

Active Fault-Tolerant System for Open Distributed Computing. 581-590 - Yingyuan Xiao, Yunsheng Liu, Xiangyang Chen, Xiaofeng Liu:

A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases. 591-600 - Iuon-Chang Lin, Chin-Chen Chang:

An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. 601-610

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














