Autonomic and Trusted Computing: 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings

Front Cover
Bin Xiao, Laurence T. Yang, Yu Hua, Christian Muller-Schloer
Springer Science & Business Media, Jul 2, 2007 - Business & Economics - 571 pages
0 Reviews
This book constitutes the refereed proceedings of the 4th International Conference on Autonomic and Trusted Computing, ATC 2007, held in Hong Kong, China in July 2007, co-located with UIC 2007, the 4th International Conference on Ubiquitous Intelligence and Computing. The 55 revised full papers presented together with 1 keynote lecture were carefully reviewed and selected from 223 submissions. The papers are organized in topical sections on cryptography and signatures, autonomic computing and services, secure and trusted computing, autonomic models and architectures, trusted models and systems, intrusion detection, access control, trusted computing and communications, key management, worm detection and data security, secured services and applications, as well as fault-tolerant systems.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing
1
Remarks on Selforganization and Trust in Organic Computing Systems
2
ZigBee Security Using IdentityBased Cryptography
3
Efficient IdentityBased Signcryption Scheme for Multiple Receivers
13
IdentityBased Proxy Signature from Pairings
22
Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection
32
A Digital Signature Mechanism and AuthenticationScheme for Group Communication in Grid
42
Cryptanalysis of ServerAided RSA Key Generation Protocols at MADNES 2005
52
A New OneWay Isolation FileAccess Method at the Granularity of a DiskBlock
296
Novel Remote User Authentication Scheme Using Bilinear Pairings
306
On the Homonymous Role in RoleBased Discretionary Access Control
313
Ontology Based Hybrid Access Control for Automatic Interoperation
323
Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding
333
A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints
344
Formal Analysis of Secure Bootstrap in Trusted Computing
352
Calculating Trust Using Aggregation Rules in Social Networks
361

ServiceContext KnowledgeBased Solution for Autonomic Adaptation
61
Middleware Based Context Management for the ComponentBased Pervasive Computing
71
Building Autonomic and Secure Service Oriented Architectures with MAWeS
82
Biology as Inspiration Towards a Novel Service LifeCycle
94
Design of ServiceBased Systems with Adaptive Tradeoff Between Security and Service Delay
103
Provably Secure IdentityBased Threshold Unsigncryption Scheme
114
Final Fantasy Securing OnLine Gaming with Trusted Computing
123
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack
135
Establishing Trust Between Mail Servers to Improve Spam Filtering
146
An Architecture for Selfhealing Autonomous Object Groups
156
A Generic and Modular System Architecture for Trustworthy Autonomous Applications
169
Cooperative Component Testing Architecture in Collaborating Network Environment
179
An Approach to a Trustworthy System Architecture Using Virtualization
191
A Global ReputationBased Trust Model in PeertoPeer Networks
203
A Trust Evolution Model for P2P Networks
216
An Adaptive Trust Control Model for a Trustworthy Component Software Platform
226
A Fuzzy Reputation Aggregation Approach
239
An Adaptive Spreading Activation Approach to Combating the FrontPeer Attack in Trust and Reputation System
249
Research on CostSensitive Learning in OneClass Anomaly Detection Algorithms
259
Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System
269
SteppingStone Detection Via RequestResponse Traffic Analysis
276
SPA Countermeasure Based on Unsigned LefttoRight Recodings
286
Enhancing Grid Security Using Trusted Virtualization
372
A Wearable System for Outdoor Running Workout State Recognition and Course Provision
385
Key Control and Contributiveness in the Shadow of Trust
395
Efficient Implementation of the KeyedHash Message Authentication Code Based on SHA1 Algorithm for Mobile Trusted Computing
410
A Secure DRM Framework for Users Domain and Key Management
420
A SecretKey Exponential Key Agreement Protocol with Smart Cards
430
Key Establishment Scheme for Sensor Networks with Low Communication Cost
441
A Worm Containment Model Based on NeighborAlarm
449
A Distributed Selfhealing Data Store
458
Malicious Codes Detection Based on Ensemble Learning
468
Generating Simplified Regular Expression Signatures for Polymorphic Worms
478
AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks
489
A PredictionBased Fair Replication Algorithm in Structured P2P Systems
499
A Virtual Disk Based Selfmanagement System
509
Defending Against Jamming Attacks in Wireless Local Area Networks
519
Schedulability Analysis of the FaultTolerant Hard RealTime Tasks with Limited Priority Levels
529
A PropertyBased Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection
539
A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling
549
An Enhanced DGIDE Platform for Intrusion Detection
559
Author Index
569
Copyright

Other editions - View all

Common terms and phrases