


default search action
ATC 2007: Hong Kong, China
- Bin Xiao, Laurence Tianruo Yang, Jianhua Ma, Christian Müller-Schloer, Yu Hua:

Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings. Lecture Notes in Computer Science 4610, Springer 2007, ISBN 978-3-540-73546-5
Keynote Speech
- Keith C. C. Chan:

An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing. 1 - Hartmut Schmeck:

Remarks on Self-organization and Trust in Organic Computing Systems. 2
Cryptography and Signatures
- Son Thanh Nguyen, Chunming Rong:

ZigBee Security Using Identity-Based Cryptography. 3-12 - Yong Yu

, Bo Yang, Xinyi Huang, Mingwu Zhang:
Efficient Identity-Based Signcryption Scheme for Multiple Receivers. 13-21 - Wei Wu, Yi Mu, Willy Susilo

, Jennifer Seberry, Xinyi Huang:
Identity-Based Proxy Signature from Pairings. 22-31 - Qianhong Wu, Willy Susilo

, Yi Mu, Bo Qin:
Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. 32-41 - Yunfa Li

, Hai Jin, Deqing Zou, Jieyun Chen, Zongfen Han:
A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid. 42-51 - Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li:

Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. 52-60
Autonomic Computing and Services
- Marcel Cremene, Michel Riveill:

Service-Context Knowledge-Based Solution for Autonomic Adaptation. 61-70 - Di Zheng, Jun Wang, Yan Jia, Weihong Han, Peng Zou:

Middleware Based Context Management for the Component-Based Pervasive Computing. 71-81 - Valentina Casola

, Emilio Pasquale Mancini, Nicola Mazzocca
, Massimiliano Rak
, Umberto Villano:
Building Autonomic and Secure Service Oriented Architectures with MAWeS. 82-93 - David Linner, Heiko Pfeffer, Ilja Radusch

, Stephan Steglich
:
Biology as Inspiration Towards a Novel Service Life-Cycle. 94-102 - Stephen S. Yau, Min Yan, Dazhi Huang:

Design of Service-Based Systems with Adaptive Tradeoff Between Security and Service Delay. 103-113
Secure and Trusted Computing
- Bo Yang, Yong Yu, Fagen Li, Ying Sun:

Provably Secure Identity-Based Threshold Unsigncryption Scheme. 114-122 - Shane Balfe, Anish Mohammed:

Final Fantasy - Securing On-Line Gaming with Trusted Computing. 123-134 - Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim

, Dongho Won:
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. 135-145 - Jimmy McGibney, Dmitri Botvich:

Establishing Trust Between Mail Servers to Improve Spam Filtering. 146-155
Autonomic Models and Architectures
- Hein Meling:

An Architecture for Self-healing Autonomous Object Groups. 156-168 - George Brancovici, Christian Müller-Schloer:

A Generic and Modular System Architecture for Trustworthy, Autonomous Applications. 169-178 - Gaeil An, Joon S. Park:

Cooperative Component Testing Architecture in Collaborating Network Environment. 179-190 - Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert:

An Approach to a Trustworthy System Architecture Using Virtualization. 191-202
Trusted Models and Systems
- Ruichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen:

CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. 203-215 - Yuan Wang, Ye Tao, Ping Yu

, Feng Xu, Jian Lü:
A Trust Evolution Model for P2P Networks. 216-225 - Zheng Yan

, Christian Prehofer:
An Adaptive Trust Control Model for a Trustworthy Component Software Platform. 226-238 - Chunmei Gui, Quanyuan Wu, Huaimin Wang:

Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach. 239-248
Intrusion Detection
- Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:

An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. 249-258 - Jun Luo, Li Ding, Zhisong Pan, Guiqiang Ni, Guyu Hu:

Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms. 259-268 - So-Young Yeo, Myung-Sun Baek, Hyoung-Kyu Song:

Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System. 269-275 - Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang:

Stepping-Stone Detection Via Request-Response Traffic Analysis. 276-285 - Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim:

SPA Countermeasure Based on Unsigned Left-to-Right Recodings. 286-295
Access Control
- Wenyuan Kuang, Yaoxue Zhang, Li Wei, Nan Xia, Guangbin Xu, Yue-Zhi Zhou:

A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block. 296-305 - Chen Yang, Wenping Ma, Xinmei Wang:

Novel Remote User Authentication Scheme Using Bilinear Pairings. 306-312 - Kai Ouyang, Xiaowen Chu

, Yixin Jiang, Hsiao-Hwa Chen, Jiangchuan Liu:
On the Homonymous Role in Role-Based Discretionary Access Control. 313-322 - Yuqing Sun, Peng Pan, Ho-fung Leung, Bin Shi:

Ontology Based Hybrid Access Control for Automatic Interoperation. 323-332 - Kuo-Lung Hung, Chin-Chen Chang:

Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. 333-343
Trusted Computing and Communications
- Shieh-Shing Lin:

A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints. 344-351 - Shuyi Chen, Yingyou Wen, Hong Zhao:

Formal Analysis of Secure Bootstrap in Trusted Computing. 352-360 - Sanguk Noh:

Calculating Trust Using Aggregation Rules in Social Networks. 361-371 - Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble:

Enhancing Grid Security Using Trusted Virtualization. 372-384 - Katsuhiro Takata, Masataka Tanaka, Jianhua Ma, Runhe Huang, Bernady O. Apduhan, Norio Shiratori:

A Wearable System for Outdoor Running Workout State Recognition and Course Provision. 385-394
Key Management
- Emmanuel Bresson, Mark Manulis:

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. 395-409 - Mooseop Kim, Youngse Kim, Jaecheol Ryou, Sungik Jun:

Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. 410-419 - Jin-Heung Lee, Sanggon Lee, Sanguk Shin:

A Secure DRM Framework for User's Domain and Key Management. 420-429 - Eun-Jun Yoon, Kee-Young Yoo:

A Secret-Key Exponential Key Agreement Protocol with Smart Cards. 430-440 - Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee:

Key Establishment Scheme for Sensor Networks with Low Communication Cost. 441-448
Worm Detection and Data Security
- Jianming Fu, Binglan Chen, Huanguo Zhang:

A Worm Containment Model Based on Neighbor-Alarm. 449-457 - Wolfgang Trumler, Jörg Ehrig, Andreas Pietzowski, Benjamin Satzger, Theo Ungerer:

A Distributed Self-healing Data Store. 458-467 - Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang:

Malicious Codes Detection Based on Ensemble Learning. 468-477 - Yong Tang, Xicheng Lu, Bin Xiao

:
Generating Simplified Regular Expression Signatures for Polymorphic Worms. 478-488
Secured Services and Applications
- Zhi (Judy) Fu, Minho Shin, John C. Strassner, Nitin Jain, Vishnu Ram, William A. Arbaugh:

AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks. 489-498 - Xianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang:

A Prediction-Based Fair Replication Algorithm in Structured P2P Systems. 499-508 - Li Wei, Yaoxue Zhang, Yue-Zhi Zhou:

TransCom: A Virtual Disk Based Self-management System. 509-518 - Wei Chen, Danwei Chen, Guozi Sun, Yingzhou Zhang:

Defending Against Jamming Attacks in Wireless Local Area Networks. 519-528
Fault-Tolerant Systems
- Jun Li, Fumin Yang, Gang Tu, Wan-hua Cao, Yansheng Lu:

Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels. 529-538 - Yoon-Hwa Choi, Myeong-Hyeon Lee:

A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection. 539-548 - Congfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao:

A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling. 549-558 - Fang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, Jia-Chun Lin:

An Enhanced DGIDE Platform for Intrusion Detection. 559-568

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














