did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540692942

Autonomic and Trusted Computing : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings

by ; ; ; ;
  • ISBN13:

    9783540692942

  • ISBN10:

    3540692940

  • Format: Paperback
  • Copyright: 2008-08-03
  • Publisher: Springer Verlag

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $159.00 Save up to $39.75
  • Buy Used
    $119.25
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC 2008, held in Oslo, Norway, in June 2008, co-located with UIC 2008, the 5th International Conference on Ubiquitous Intelligence and Computing. The 25 revised full papers presented together with 26 special session papers and 1 keynote talk were carefully reviewed and selected from 75 submissions. The regular papers are organized in topical sections on intrusion detection, trust, trusted systems and crypto, autonomic computing, organic computing, knowledge and patterns, and pervasive systems. The special session papers cover issues such as organic computing, trust, trust and dependable systems, routing and reliable systems, sensor networks, VoIP, and watermarking.

Table of Contents

Sensor Network Applications Implemented by Industry and Their Security Challengesp. 1
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matchingp. 2
Preventing DDoS Attacks Based on Credit Model for P2P Streaming Systemp. 13
Design, Prototype, and Evaluation of a Network Monitoring Libraryp. 21
Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LANp. 36
A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environmentsp. 47
Using Automated Planning for Trusted Sell-organising Organic Computing Systemsp. 60
A Trusted Group Signature Architecture in Virtual Computing Environmentp. 73
SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networksp. 86
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemesp. 100
An Integrated Solution for Policy Filtering and Traffic Anomaly Detectionp. 106
Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installationsp. 121
SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networksp. 134
Scheduling for Reliable Execution in Autonomic Systemsp. 149
Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptationp. 162
Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robotsp. 177
Maximising Personal Utility Using Intelligent Strategy in Minority Gamep. 191
Simulation-Based Optimization Approach for Software Cost Model with Rejuvenationp. 206
Organic Control of Traffic Lightsp. 219
Concepts for Autonomous Control Flow Checking for Embedded CPUsp. 234
Autonomous Querying for Knowledge Networksp. 249
Discovery of Useful Patterns from Tree Structured Documents with Label-Projected Databasep. 264
Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Networkp. 279
Self-reconfiguration in Highly Available Pervasive Computing Systemsp. 289
Modeling Modern Social Network Based Epidemics: A Case Study of Rosep. 302
An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSLp. 316
Distributed Performance Control in Organic Embedded Systemsp. 331
An Operating System Architecture for Organic Computing in Embedded Real-Time Systemsp. 343
Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networksp. 358
Embedding Dynamic Behaviour into a Self configuring Software Systemp. 373
Service Discovery of IP Cameras Using SIP and Zeroconf Protocolsp. 388
Adaptability of the TRSIM Model to Some Changes in Agents Behaviourp. 403
Trusting Groups in Coalition Formation Using Social Distancep. 418
Adjustable Trust Model for Access Controlp. 429
Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filteringp. 444
A User Behavior Based Trust Model for Mobile Applicationsp. 455
Managing Contracts in Pleiades Using Trust Managementp. 470
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Familyp. 481
Annotation Markers for Runtime Replication Protocol Selectionp. 496
Enhanced Three-Round Smart Card-Based Key Exchange Protocolp. 507
Assertions Signcryption Scheme in Decentralized Autonomous Trust Environmentsp. 516
A Study of Information Security Practice in a Critical Infrastructure Applicationp. 527
Web Search Results Clustering Based on a Novel Suffix Tree Structurep. 540
Di-GAFR: Directed Greedy Adaptive Face-Based Routingp. 555
Cooperative Management Framework for Inter-domain Routing Systemp. 567
Performance Problem Determination Using Combined Dependency Analysis for Reliable Systemp. 577
A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwardsp. 588
Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxesp. 603
Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systemsp. 615
A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filterp. 629
Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Serverp. 641
A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networksp. 655
Author Indexp. 665
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program