Eintrag weiter verarbeiten

Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings

Gespeichert in:

Personen und Körperschaften: Xie, Bing (VerfasserIn), Branke, Jürgen (Sonstige), Sadjadi, S. Masoud (Sonstige), Zhang, Daqing (Sonstige), Zhou, Xingshe (Sonstige)
Titel: Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings/ edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2010
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 6407
Schlagwörter:
Buchausg. u.d.T.: Autonomic and trusted computing, Berlin : Springer, 2010, XV, 328 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 08551cam a22011652 4500
001 0-1650330529
003 DE-627
005 20240122105241.0
007 cr uuu---uuuuu
008 101102s2010 gw |||||o 00| ||eng c
020 |a 9783642165764  |9 978-3-642-16576-4 
024 7 |a 10.1007/978-3-642-16576-4  |2 doi 
035 |a (DE-627)1650330529 
035 |a (DE-576)332858685 
035 |a (DE-599)BSZ332858685 
035 |a (OCoLC)682101417 
035 |a (OCoLC)731498725 
035 |a (DE-He213)978-3-642-16576-4 
035 |a (EBP)040530744 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE 
050 0 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
084 |a SS 4800  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a 54.38  |2 bkl 
084 |a 54.72  |2 bkl 
100 1 |a Xie, Bing  |0 (DE-588)142557897  |0 (DE-627)637296281  |0 (DE-576)331601249  |4 aut 
245 1 0 |a Autonomic and Trusted Computing  |b 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings  |c edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010 
300 |a Online-Ressource (XVII, 328p. 112 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 6407 
490 0 |a SpringerLink  |a Bücher 
520 |a Autonomic and Organic Computing -- Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras -- A Formal Framework for Compositional Verification of Organic Computing Systems -- On-Line Adaptive Algorithms in Autonomic Restart Control -- Designing Self-healing in Automotive Systems -- Trustworthy Organic Computing Systems: Challenges and Perspectives -- AC/OC Network and Protocol -- Adaptive Control of Sensor Networks -- Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile Application Usage -- Context Based Trust Normalization in Service-Oriented Environments -- A Framework for Trust Enabled Software Asset Retrieval -- Opportunistic Trust Based P2P Services Framework for Disconnected MANETs -- A Risk-Aware Resource Service Decision Strategy for Global Computing -- Trustworthy Computing -- Message Race Detection for Web Services by an SMT-Based Analysis -- A User-Oriented Approach to Assessing Web Service Trustworthiness -- Improving the Trustworthiness of Service QoS Information in Service-Based Systems -- Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software -- The Testing Method for Interface Customized Component -- Trust-Related Security -- A New Monitor Model for Enhancing Trust-Based Systems -- Design and Analysis of “Flexible” k-out-of-n Signatures -- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints -- Invited Session -- Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture -- Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace -- On Alleviating Reader Collisions Towards High Efficient RFID Systems. 
520 |a Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems––as well as services––available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi’an, China, October 26–29, 2010. 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Information systems 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Software engineering 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
650 0 |a Computer networks . 
650 0 |a Application software. 
650 0 |a Electronic data processing 
655 7 |a Konferenzschrift  |y 2010  |z Xi'an  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4820003-7  |0 (DE-627)482247932  |0 (DE-576)21671561X  |a Autonomic Computing  |2 gnd 
689 0 1 |D s  |0 (DE-588)7624947-5  |0 (DE-627)577733133  |0 (DE-576)285618547  |a Organic Computing  |2 gnd 
689 0 2 |D s  |0 (DE-588)7562931-8  |0 (DE-627)526751819  |0 (DE-576)263014703  |a Trusted Computing  |2 gnd 
689 0 |5 DE-101 
700 1 |a Branke, Jürgen  |d 1969-  |0 (DE-588)132423030  |0 (DE-627)577698249  |0 (DE-576)177358971  |4 oth 
700 1 |a Sadjadi, S. Masoud  |4 oth 
700 1 |a Zhang, Daqing  |4 oth 
700 1 |a Zhou, Xingshe  |4 oth 
776 1 |z 9783642165757 
776 0 8 |i Buchausg. u.d.T.  |t Autonomic and trusted computing  |d Berlin : Springer, 2010  |h XV, 328 S.  |w (DE-627)635464780  |w (DE-576)332290433  |z 3642165753  |z 9783642165757 
830 0 |a Lecture notes in computer science  |v 6407  |9 6407  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-16576-4  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz332858685cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20151015105546  |3 Cover 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC  |b 2010 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SCS  |b 2010 
912 |a ZDB-2-SXCS  |b 2010 
912 |a ZDB-2-SEB  |b 2010 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
936 b k |a 54.72  |j Künstliche Intelligenz  |q SEPA  |0 (DE-627)10641240X 
951 |a BO 
950 |a Autonomes Computing 
950 |a Datenverarbeitungssystem 
950 |a Autonomes System 
950 |a Autonomes Rechnen 
950 |a Organic Computing 
950 |a Informationstechnik 
950 |a Sicherheit 
950 |a Vertrauenswürdigkeit 
950 |a Datensicherung 
950 |a Computersicherheit 
950 |a Sealed Cloud 
950 |a Rechnerorganik 
950 |a Autonomic Computing 
951 |b XB-CN 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-16576-4  |9 DE-14 
852 |a DE-14  |z 2011-07-20T14:58:08Z  |x epn:3336561795 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-16576-4  |9 DE-15 
852 |a DE-15  |z 2011-05-16T16:33:23Z  |x epn:3336561868 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-16576-4  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |z 2011-01-26T14:24:56Z  |x epn:3336561973 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-16576-4  |9 DE-520 
852 |a DE-520  |z 2010-11-02T09:08:15Z  |x epn:3336562074 
980 |a 1650330529  |b 0  |k 1650330529  |o 332858685 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Autonomic+and+Trusted+Computing%3A+7th+International+Conference%2C+ATC+2010%2C+Xi%E2%80%99an%2C+China%2C+October+26-29%2C+2010.+Proceedings&rft.date=2010&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Autonomic+and+Trusted+Computing%3A+7th+International+Conference%2C+ATC+2010%2C+Xi%E2%80%99an%2C+China%2C+October+26-29%2C+2010.+Proceedings&rft.series=Lecture+notes+in+computer+science%2C+6407&rft.au=Xie%2C+Bing&rft.pub=Springer+Berlin+Heidelberg&rft.edition=&rft.isbn=3642165761
SOLR
_version_ 1789359422895554560
access_facet Electronic Resources
author Xie, Bing
author2 Branke, Jürgen, Sadjadi, S. Masoud, Zhang, Daqing, Zhou, Xingshe
author2_role oth, oth, oth, oth
author2_variant j b jb, s m s sm sms, d z dz, x z xz
author_facet Xie, Bing, Branke, Jürgen, Sadjadi, S. Masoud, Zhang, Daqing, Zhou, Xingshe
author_role aut
author_sort Xie, Bing
author_variant b x bx
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
contents Autonomic and Organic Computing -- Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras -- A Formal Framework for Compositional Verification of Organic Computing Systems -- On-Line Adaptive Algorithms in Autonomic Restart Control -- Designing Self-healing in Automotive Systems -- Trustworthy Organic Computing Systems: Challenges and Perspectives -- AC/OC Network and Protocol -- Adaptive Control of Sensor Networks -- Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile Application Usage -- Context Based Trust Normalization in Service-Oriented Environments -- A Framework for Trust Enabled Software Asset Retrieval -- Opportunistic Trust Based P2P Services Framework for Disconnected MANETs -- A Risk-Aware Resource Service Decision Strategy for Global Computing -- Trustworthy Computing -- Message Race Detection for Web Services by an SMT-Based Analysis -- A User-Oriented Approach to Assessing Web Service Trustworthiness -- Improving the Trustworthiness of Service QoS Information in Service-Based Systems -- Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software -- The Testing Method for Interface Customized Component -- Trust-Related Security -- A New Monitor Model for Enhancing Trust-Based Systems -- Design and Analysis of “Flexible” k-out-of-n Signatures -- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints -- Invited Session -- Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture -- Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace -- On Alleviating Reader Collisions Towards High Efficient RFID Systems., Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems––as well as services––available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi’an, China, October 26–29, 2010.
ctrlnum (DE-627)1650330529, (DE-576)332858685, (DE-599)BSZ332858685, (OCoLC)682101417, (OCoLC)731498725, (DE-He213)978-3-642-16576-4, (EBP)040530744
de15_date 2011-05-16T16:33:23Z
doi_str_mv 10.1007/978-3-642-16576-4
era_facet 2010
facet_912a ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Autonomic Computing, Organic Computing, Trusted Computing
finc_class_facet Informatik, Mathematik
finc_id_str 0001438006
fincclass_txtF_mv science-computerscience
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2010 Xi'an (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person China
geographic_facet Xi'an
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 6407
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1650330529
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer Berlin Heidelberg, 2010
imprint_str_mv Berlin, Heidelberg: Springer Berlin Heidelberg, 2010
institution DE-14, DE-Zi4, DE-520, DE-15
is_hierarchy_id 0-1650330529
is_hierarchy_title Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings
isbn 9783642165764
isbn_isn_mv 9783642165757, 3642165753
issn_isn_mv 1611-3349
kxp_id_str 1650330529
language English
last_indexed 2024-01-28T18:22:03.044Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Software engineering, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Application software., Electronic data processing, Autonomic Computing, Organic Computing, Trusted Computing
marc024a_ct_mv 10.1007/978-3-642-16576-4
match_str xie2010autonomicandtrustedcomputing7thinternationalconferenceatc2010xianchinaoctober26292010proceedings
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)6407
names_id_str_mv (DE-588)142557897, (DE-627)637296281, (DE-576)331601249, (DE-588)132423030, (DE-627)577698249, (DE-576)177358971
oclc_num 682101417, 731498725
physical Online-Ressource (XVII, 328p. 112 illus, digital)
publishDate 2010
publishDateSort 2010
publishPlace Berlin, Heidelberg
publisher Springer Berlin Heidelberg
record_format marcfinc
record_id 332858685
recordtype marcfinc
rsn_id_str_mv (DE-15)2462138
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 6407
series2 Lecture Notes in Computer Science ; 6407, SpringerLink ; Bücher
source_id 0
spelling Xie, Bing (DE-588)142557897 (DE-627)637296281 (DE-576)331601249 aut, Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (XVII, 328p. 112 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6407, SpringerLink Bücher, Autonomic and Organic Computing -- Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras -- A Formal Framework for Compositional Verification of Organic Computing Systems -- On-Line Adaptive Algorithms in Autonomic Restart Control -- Designing Self-healing in Automotive Systems -- Trustworthy Organic Computing Systems: Challenges and Perspectives -- AC/OC Network and Protocol -- Adaptive Control of Sensor Networks -- Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile Application Usage -- Context Based Trust Normalization in Service-Oriented Environments -- A Framework for Trust Enabled Software Asset Retrieval -- Opportunistic Trust Based P2P Services Framework for Disconnected MANETs -- A Risk-Aware Resource Service Decision Strategy for Global Computing -- Trustworthy Computing -- Message Race Detection for Web Services by an SMT-Based Analysis -- A User-Oriented Approach to Assessing Web Service Trustworthiness -- Improving the Trustworthiness of Service QoS Information in Service-Based Systems -- Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software -- The Testing Method for Interface Customized Component -- Trust-Related Security -- A New Monitor Model for Enhancing Trust-Based Systems -- Design and Analysis of “Flexible” k-out-of-n Signatures -- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints -- Invited Session -- Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture -- Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace -- On Alleviating Reader Collisions Towards High Efficient RFID Systems., Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems––as well as services––available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi’an, China, October 26–29, 2010., Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Software engineering, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift 2010 Xi'an (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4820003-7 (DE-627)482247932 (DE-576)21671561X Autonomic Computing gnd, s (DE-588)7624947-5 (DE-627)577733133 (DE-576)285618547 Organic Computing gnd, s (DE-588)7562931-8 (DE-627)526751819 (DE-576)263014703 Trusted Computing gnd, DE-101, Branke, Jürgen 1969- (DE-588)132423030 (DE-627)577698249 (DE-576)177358971 oth, Sadjadi, S. Masoud oth, Zhang, Daqing oth, Zhou, Xingshe oth, 9783642165757, Buchausg. u.d.T. Autonomic and trusted computing Berlin : Springer, 2010 XV, 328 S. (DE-627)635464780 (DE-576)332290433 3642165753 9783642165757, Lecture notes in computer science 6407 6407 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-16576-4 X:SPRINGER Verlag lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz332858685cov.jpg V:DE-576 X:springer image/jpeg 20151015105546 Cover, http://dx.doi.org/10.1007/978-3-642-16576-4 DE-14, DE-14 2011-07-20T14:58:08Z epn:3336561795, http://dx.doi.org/10.1007/978-3-642-16576-4 DE-15, DE-15 2011-05-16T16:33:23Z epn:3336561868, http://dx.doi.org/10.1007/978-3-642-16576-4 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:24:56Z epn:3336561973, http://dx.doi.org/10.1007/978-3-642-16576-4 DE-520, DE-520 2010-11-02T09:08:15Z epn:3336562074
spellingShingle Xie, Bing, Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings, Lecture notes in computer science, 6407, Autonomic and Organic Computing -- Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras -- A Formal Framework for Compositional Verification of Organic Computing Systems -- On-Line Adaptive Algorithms in Autonomic Restart Control -- Designing Self-healing in Automotive Systems -- Trustworthy Organic Computing Systems: Challenges and Perspectives -- AC/OC Network and Protocol -- Adaptive Control of Sensor Networks -- Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile Application Usage -- Context Based Trust Normalization in Service-Oriented Environments -- A Framework for Trust Enabled Software Asset Retrieval -- Opportunistic Trust Based P2P Services Framework for Disconnected MANETs -- A Risk-Aware Resource Service Decision Strategy for Global Computing -- Trustworthy Computing -- Message Race Detection for Web Services by an SMT-Based Analysis -- A User-Oriented Approach to Assessing Web Service Trustworthiness -- Improving the Trustworthiness of Service QoS Information in Service-Based Systems -- Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software -- The Testing Method for Interface Customized Component -- Trust-Related Security -- A New Monitor Model for Enhancing Trust-Based Systems -- Design and Analysis of “Flexible” k-out-of-n Signatures -- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints -- Invited Session -- Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture -- Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace -- On Alleviating Reader Collisions Towards High Efficient RFID Systems., Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems––as well as services––available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi’an, China, October 26–29, 2010., Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Software engineering, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift 2010 Xi'an, Autonomic Computing, Organic Computing, Trusted Computing
swb_id_str 332858685
title Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings
title_auth Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings
title_full Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou
title_fullStr Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou
title_full_unstemmed Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou
title_in_hierarchy 6407. Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings (2010)
title_short Autonomic and Trusted Computing
title_sort autonomic and trusted computing 7th international conference atc 2010 xi an china october 26 29 2010 proceedings
title_sub 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings
title_unstemmed Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings
topic Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Software engineering, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift 2010 Xi'an, Autonomic Computing, Organic Computing, Trusted Computing
topic_facet Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Software engineering, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift, Autonomic Computing, Organic Computing, Trusted Computing
url https://doi.org/10.1007/978-3-642-16576-4, https://swbplus.bsz-bw.de/bsz332858685cov.jpg, http://dx.doi.org/10.1007/978-3-642-16576-4