Autonomic and Trusted Computing: 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 4th International Conference on Autonomic and Trusted Computing, ATC 2007, held in Hong Kong, China in July 2007, co-located with UIC 2007, the 4th International Conference on Ubiquitous Intelligence and Computing.

The 55 revised full papers presented together with 1 keynote lecture were carefully reviewed and selected from 223 submissions. The papers are organized in topical sections on cryptography and signatures, autonomic computing and services, secure and trusted computing, autonomic models and architectures, trusted models and systems, intrusion detection, access control, trusted computing and communications, key management, worm detection and data security, secured services and applications, as well as fault-tolerant systems.

Author(s): Keith C. C. Chan (auth.), Bin Xiao, Laurence T. Yang, Jianhua Ma, Christian Muller-Schloer, Yu Hua (eds.)
Series: Lecture Notes in Computer Science 4610
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 574
Tags: Systems and Data Security; Software Engineering; Computer Communication Networks; Data Encryption; Information Systems Applications (incl.Internet); Management of Computing and Information Systems

Front Matter....Pages -
An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing....Pages 1-1
Remarks on Self-organization and Trust in Organic Computing Systems....Pages 2-2
ZigBee Security Using Identity-Based Cryptography....Pages 3-12
Efficient Identity-Based Signcryption Scheme for Multiple Receivers....Pages 13-21
Identity-Based Proxy Signature from Pairings....Pages 22-31
Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection....Pages 32-41
A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid....Pages 42-51
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005....Pages 52-60
Service-Context Knowledge-Based Solution for Autonomic Adaptation....Pages 61-70
Middleware Based Context Management for the Component-Based Pervasive Computing....Pages 71-81
Building Autonomic and Secure Service Oriented Architectures with MAWeS....Pages 82-93
Biology as Inspiration Towards a Novel Service Life-Cycle....Pages 94-102
Design of Service–Based Systems with Adaptive Tradeoff Between Security and Service Delay....Pages 103-113
Provably Secure Identity-Based Threshold Unsigncryption Scheme....Pages 114-122
Final Fantasy – Securing On-Line Gaming with Trusted Computing....Pages 123-134
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack....Pages 135-145
Establishing Trust Between Mail Servers to Improve Spam Filtering....Pages 146-155
An Architecture for Self-healing Autonomous Object Groups....Pages 156-168
A Generic and Modular System Architecture for Trustworthy, Autonomous Applications....Pages 169-178
Cooperative Component Testing Architecture in Collaborating Network Environment....Pages 179-190
An Approach to a Trustworthy System Architecture Using Virtualization....Pages 191-202
CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks....Pages 203-215
A Trust Evolution Model for P2P Networks....Pages 216-225
An Adaptive Trust Control Model for a Trustworthy Component Software Platform....Pages 226-238
Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach....Pages 239-248
An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System....Pages 249-258
Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms....Pages 259-268
Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System....Pages 269-275
Stepping-Stone Detection Via Request-Response Traffic Analysis....Pages 276-285
SPA Countermeasure Based on Unsigned Left-to-Right Recodings....Pages 286-295
A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block....Pages 296-305
Novel Remote User Authentication Scheme Using Bilinear Pairings....Pages 306-312
On the Homonymous Role in Role-Based Discretionary Access Control....Pages 313-322
Ontology Based Hybrid Access Control for Automatic Interoperation....Pages 323-332
Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding....Pages 333-343
A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints....Pages 344-351
Formal Analysis of Secure Bootstrap in Trusted Computing....Pages 352-360
Calculating Trust Using Aggregation Rules in Social Networks....Pages 361-371
Enhancing Grid Security Using Trusted Virtualization....Pages 372-384
A Wearable System for Outdoor Running Workout State Recognition and Course Provision....Pages 385-394
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust....Pages 395-409
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing....Pages 410-419
A Secure DRM Framework for User’s Domain and Key Management....Pages 420-429
A Secret-Key Exponential Key Agreement Protocol with Smart Cards....Pages 430-440
Key Establishment Scheme for Sensor Networks with Low Communication Cost....Pages 441-448
A Worm Containment Model Based on Neighbor-Alarm....Pages 449-457
A Distributed Self-healing Data Store....Pages 458-467
Malicious Codes Detection Based on Ensemble Learning....Pages 468-477
Generating Simplified Regular Expression Signatures for Polymorphic Worms....Pages 478-488
AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks....Pages 489-498
A Prediction-Based Fair Replication Algorithm in Structured P2P Systems....Pages 499-508
TransCom: A Virtual Disk Based Self-management System....Pages 509-518
Defending Against Jamming Attacks in Wireless Local Area Networks....Pages 519-528
Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels....Pages 529-538
A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection....Pages 539-548
A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling....Pages 549-558
An Enhanced DGIDE Platform for Intrusion Detection....Pages 559-568
Back Matter....Pages -