Autonomic and Trusted Computing

5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings

ISBN: 978-3-540-69294-2 (Print) 978-3-540-69295-9 (Online)

Table of contents (52 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Keynote Speech

    1. No Access

      Book Chapter

      Pages 1-1

      Sensor Network Applications Implemented by Industry and Their Security Challenges

  3. Regular Papers

    1. Intrusion Detection

      1. No Access

        Book Chapter

        Pages 2-12

        Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching

      2. No Access

        Book Chapter

        Pages 13-20

        Preventing DDoS Attacks Based on Credit Model for P2P Streaming System

      3. No Access

        Book Chapter

        Pages 21-35

        Design, Prototype, and Evaluation of a Network Monitoring Library

      4. No Access

        Book Chapter

        Pages 36-46

        Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN

      Trust

      1. No Access

        Book Chapter

        Pages 47-59

        A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments

      2. No Access

        Book Chapter

        Pages 60-72

        Using Automated Planning for Trusted Self-organising Organic Computing Systems

      3. No Access

        Book Chapter

        Pages 73-85

        A Trusted Group Signature Architecture in Virtual Computing Environment

      4. No Access

        Book Chapter

        Pages 86-99

        SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks

      Trusted Systems and Crypto

      1. No Access

        Book Chapter

        Pages 100-105

        Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes

      2. No Access

        Book Chapter

        Pages 106-120

        An Integrated Solution for Policy Filtering and Traffic Anomaly Detection

      3. No Access

        Book Chapter

        Pages 121-133

        Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations

      4. No Access

        Book Chapter

        Pages 134-148

        SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks

      Autonomic Computing

      1. No Access

        Book Chapter

        Pages 149-161

        Scheduling for Reliable Execution in Autonomic Systems

      2. No Access

        Book Chapter

        Pages 162-176

        Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation

      3. No Access

        Book Chapter

        Pages 177-190

        Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots

      4. No Access

        Book Chapter

        Pages 191-205

        Maximising Personal Utility Using Intelligent Strategy in Minority Game

      Organic Computing

      1. No Access

        Book Chapter

        Pages 206-218

        Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation

      2. No Access

        Book Chapter

        Pages 219-233

        Organic Control of Traffic Lights

      3. No Access

        Book Chapter

        Pages 234-248

        Concepts for Autonomous Control Flow Checking for Embedded CPUs

previous Page of 3