Erdal Cayirci (auth.), Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence T. Yang, Jianhua Ma (eds.)3540692940, 9783540692942
This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC 2008, held in Oslo, Norway, in June 2008, co-located with UIC 2008, the 5th International Conference on Ubiquitous Intelligence and Computing.
The 25 revised full papers presented together with 26 special session papers and 1 keynote talk were carefully reviewed and selected from 75 submissions. The regular papers are organized in topical sections on intrusion detection, trust, trusted systems and crypto, autonomic computing, organic computing, knowledge and patterns, and pervasive systems. The special session papers cover issues such as organic computing, trust, trust and dependable systems, routing and reliable systems, sensor networks, VoIP, and watermarking.
Table of contents :
Front Matter….Pages –
Sensor Network Applications Implemented by Industry and Their Security Challenges….Pages 1-1
Scheduling for Reliable Execution in Autonomic Systems….Pages 149-161
Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation….Pages 162-176
Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots….Pages 177-190
Maximising Personal Utility Using Intelligent Strategy in Minority Game….Pages 191-205
Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation….Pages 206-218
Organic Control of Traffic Lights….Pages 219-233
Concepts for Autonomous Control Flow Checking for Embedded CPUs….Pages 234-248
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching….Pages 2-12
Preventing DDoS Attacks Based on Credit Model for P2P Streaming System….Pages 13-20
Design, Prototype, and Evaluation of a Network Monitoring Library….Pages 21-35
Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN….Pages 36-46
A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments….Pages 47-59
Using Automated Planning for Trusted Self-organising Organic Computing Systems….Pages 60-72
A Trusted Group Signature Architecture in Virtual Computing Environment….Pages 73-85
SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks….Pages 86-99
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes….Pages 100-105
An Integrated Solution for Policy Filtering and Traffic Anomaly Detection….Pages 106-120
Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations….Pages 121-133
SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks….Pages 134-148
Autonomous Querying for Knowledge Networks….Pages 249-263
Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database….Pages 264-278
Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network….Pages 279-288
Self-reconfiguration in Highly Available Pervasive Computing Systems….Pages 289-301
Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose….Pages 302-315
An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL….Pages 316-330
Distributed Performance Control in Organic Embedded Systems….Pages 331-342
An Operating System Architecture for Organic Computing in Embedded Real-Time Systems….Pages 343-357
Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks….Pages 358-372
Embedding Dynamic Behaviour into a Self-configuring Software System….Pages 373-387
Service Discovery of IP Cameras Using SIP and Zeroconf Protocols….Pages 388-402
Adaptability of the TRSIM Model to Some Changes in Agents Behaviour….Pages 403-417
Trusting Groups in Coalition Formation Using Social Distance….Pages 418-428
Adjustable Trust Model for Access Control….Pages 429-443
Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering….Pages 444-454
A User Behavior Based Trust Model for Mobile Applications….Pages 455-469
Managing Contracts in Pleiades Using Trust Management….Pages 470-480
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family….Pages 481-495
Annotation Markers for Runtime Replication Protocol Selection….Pages 496-506
Enhanced Three-Round Smart Card-Based Key Exchange Protocol….Pages 507-515
Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments….Pages 516-526
A Study of Information Security Practice in a Critical Infrastructure Application….Pages 527-539
Web Search Results Clustering Based on a Novel Suffix Tree Structure….Pages 540-554
Di-GAFR: Directed Greedy Adaptive Face-Based Routing….Pages 555-566
Cooperative Management Framework for Inter-domain Routing System….Pages 567-576
Performance Problem Determination Using Combined Dependency Analysis for Reliable System….Pages 577-587
A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards….Pages 588-602
Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes….Pages 603-614
Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems….Pages 615-628
A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter….Pages 629-640
Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server….Pages 641-654
A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks….Pages 655-663
Back Matter….Pages –
Reviews
There are no reviews yet.