default search action
ATC 2007: Hong Kong, China
- Bin Xiao, Laurence Tianruo Yang, Jianhua Ma, Christian Müller-Schloer, Yu Hua:
Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings. Lecture Notes in Computer Science 4610, Springer 2007, ISBN 978-3-540-73546-5
Keynote Speech
- Keith C. C. Chan:
An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing. 1 - Hartmut Schmeck:
Remarks on Self-organization and Trust in Organic Computing Systems. 2
Cryptography and Signatures
- Son Thanh Nguyen, Chunming Rong:
ZigBee Security Using Identity-Based Cryptography. 3-12 - Yong Yu, Bo Yang, Xinyi Huang, Mingwu Zhang:
Efficient Identity-Based Signcryption Scheme for Multiple Receivers. 13-21 - Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang:
Identity-Based Proxy Signature from Pairings. 22-31 - Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin:
Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. 32-41 - Yunfa Li, Hai Jin, Deqing Zou, Jieyun Chen, Zongfen Han:
A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid. 42-51 - Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li:
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. 52-60
Autonomic Computing and Services
- Marcel Cremene, Michel Riveill:
Service-Context Knowledge-Based Solution for Autonomic Adaptation. 61-70 - Di Zheng, Jun Wang, Yan Jia, Weihong Han, Peng Zou:
Middleware Based Context Management for the Component-Based Pervasive Computing. 71-81 - Valentina Casola, Emilio Pasquale Mancini, Nicola Mazzocca, Massimiliano Rak, Umberto Villano:
Building Autonomic and Secure Service Oriented Architectures with MAWeS. 82-93 - David Linner, Heiko Pfeffer, Ilja Radusch, Stephan Steglich:
Biology as Inspiration Towards a Novel Service Life-Cycle. 94-102 - Stephen S. Yau, Min Yan, Dazhi Huang:
Design of Service-Based Systems with Adaptive Tradeoff Between Security and Service Delay. 103-113
Secure and Trusted Computing
- Bo Yang, Yong Yu, Fagen Li, Ying Sun:
Provably Secure Identity-Based Threshold Unsigncryption Scheme. 114-122 - Shane Balfe, Anish Mohammed:
Final Fantasy - Securing On-Line Gaming with Trusted Computing. 123-134 - Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won:
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. 135-145 - Jimmy McGibney, Dmitri Botvich:
Establishing Trust Between Mail Servers to Improve Spam Filtering. 146-155
Autonomic Models and Architectures
- Hein Meling:
An Architecture for Self-healing Autonomous Object Groups. 156-168 - George Brancovici, Christian Müller-Schloer:
A Generic and Modular System Architecture for Trustworthy, Autonomous Applications. 169-178 - Gaeil An, Joon S. Park:
Cooperative Component Testing Architecture in Collaborating Network Environment. 179-190 - Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert:
An Approach to a Trustworthy System Architecture Using Virtualization. 191-202
Trusted Models and Systems
- Ruichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen:
CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. 203-215 - Yuan Wang, Ye Tao, Ping Yu, Feng Xu, Jian Lü:
A Trust Evolution Model for P2P Networks. 216-225 - Zheng Yan, Christian Prehofer:
An Adaptive Trust Control Model for a Trustworthy Component Software Platform. 226-238 - Chunmei Gui, Quanyuan Wu, Huaimin Wang:
Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach. 239-248
Intrusion Detection
- Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. 249-258 - Jun Luo, Li Ding, Zhisong Pan, Guiqiang Ni, Guyu Hu:
Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms. 259-268 - So-Young Yeo, Myung-Sun Baek, Hyoung-Kyu Song:
Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System. 269-275 - Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang:
Stepping-Stone Detection Via Request-Response Traffic Analysis. 276-285 - Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim:
SPA Countermeasure Based on Unsigned Left-to-Right Recodings. 286-295
Access Control
- Wenyuan Kuang, Yaoxue Zhang, Li Wei, Nan Xia, Guangbin Xu, Yue-Zhi Zhou:
A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block. 296-305 - Chen Yang, Wenping Ma, Xinmei Wang:
Novel Remote User Authentication Scheme Using Bilinear Pairings. 306-312 - Kai Ouyang, Xiaowen Chu, Yixin Jiang, Hsiao-Hwa Chen, Jiangchuan Liu:
On the Homonymous Role in Role-Based Discretionary Access Control. 313-322 - Yuqing Sun, Peng Pan, Ho-fung Leung, Bin Shi:
Ontology Based Hybrid Access Control for Automatic Interoperation. 323-332 - Kuo-Lung Hung, Chin-Chen Chang:
Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. 333-343
Trusted Computing and Communications
- Shieh-Shing Lin:
A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints. 344-351 - Shuyi Chen, Yingyou Wen, Hong Zhao:
Formal Analysis of Secure Bootstrap in Trusted Computing. 352-360 - Sanguk Noh:
Calculating Trust Using Aggregation Rules in Social Networks. 361-371 - Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble:
Enhancing Grid Security Using Trusted Virtualization. 372-384 - Katsuhiro Takata, Masataka Tanaka, Jianhua Ma, Runhe Huang, Bernady O. Apduhan, Norio Shiratori:
A Wearable System for Outdoor Running Workout State Recognition and Course Provision. 385-394
Key Management
- Emmanuel Bresson, Mark Manulis:
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. 395-409 - Mooseop Kim, Youngse Kim, Jaecheol Ryou, Sungik Jun:
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. 410-419 - Jin-Heung Lee, Sanggon Lee, Sanguk Shin:
A Secure DRM Framework for User's Domain and Key Management. 420-429 - Eun-Jun Yoon, Kee-Young Yoo:
A Secret-Key Exponential Key Agreement Protocol with Smart Cards. 430-440 - Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee:
Key Establishment Scheme for Sensor Networks with Low Communication Cost. 441-448
Worm Detection and Data Security
- Jianming Fu, Binglan Chen, Huanguo Zhang:
A Worm Containment Model Based on Neighbor-Alarm. 449-457 - Wolfgang Trumler, Jörg Ehrig, Andreas Pietzowski, Benjamin Satzger, Theo Ungerer:
A Distributed Self-healing Data Store. 458-467 - Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang:
Malicious Codes Detection Based on Ensemble Learning. 468-477 - Yong Tang, Xicheng Lu, Bin Xiao:
Generating Simplified Regular Expression Signatures for Polymorphic Worms. 478-488
Secured Services and Applications
- Zhi (Judy) Fu, Minho Shin, John C. Strassner, Nitin Jain, Vishnu Ram, William A. Arbaugh:
AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks. 489-498 - Xianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang:
A Prediction-Based Fair Replication Algorithm in Structured P2P Systems. 499-508 - Li Wei, Yaoxue Zhang, Yue-Zhi Zhou:
TransCom: A Virtual Disk Based Self-management System. 509-518 - Wei Chen, Danwei Chen, Guozi Sun, Yingzhou Zhang:
Defending Against Jamming Attacks in Wireless Local Area Networks. 519-528
Fault-Tolerant Systems
- Jun Li, Fumin Yang, Gang Tu, Wan-hua Cao, Yansheng Lu:
Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels. 529-538 - Yoon-Hwa Choi, Myeong-Hyeon Lee:
A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection. 539-548 - Congfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao:
A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling. 549-558 - Fang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, Jia-Chun Lin:
An Enhanced DGIDE Platform for Intrusion Detection. 559-568
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.