|
|
|
|
LEADER |
08551cam a22011652 4500 |
001 |
0-1650330529 |
003 |
DE-627 |
005 |
20240122105241.0 |
007 |
cr uuu---uuuuu |
008 |
101102s2010 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642165764
|9 978-3-642-16576-4
|
024 |
7 |
|
|a 10.1007/978-3-642-16576-4
|2 doi
|
035 |
|
|
|a (DE-627)1650330529
|
035 |
|
|
|a (DE-576)332858685
|
035 |
|
|
|a (DE-599)BSZ332858685
|
035 |
|
|
|a (OCoLC)682101417
|
035 |
|
|
|a (OCoLC)731498725
|
035 |
|
|
|a (DE-He213)978-3-642-16576-4
|
035 |
|
|
|a (EBP)040530744
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a 54.38
|2 bkl
|
084 |
|
|
|a 54.72
|2 bkl
|
100 |
1 |
|
|a Xie, Bing
|0 (DE-588)142557897
|0 (DE-627)637296281
|0 (DE-576)331601249
|4 aut
|
245 |
1 |
0 |
|a Autonomic and Trusted Computing
|b 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings
|c edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2010
|
300 |
|
|
|a Online-Ressource (XVII, 328p. 112 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 6407
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
520 |
|
|
|a Autonomic and Organic Computing -- Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras -- A Formal Framework for Compositional Verification of Organic Computing Systems -- On-Line Adaptive Algorithms in Autonomic Restart Control -- Designing Self-healing in Automotive Systems -- Trustworthy Organic Computing Systems: Challenges and Perspectives -- AC/OC Network and Protocol -- Adaptive Control of Sensor Networks -- Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile Application Usage -- Context Based Trust Normalization in Service-Oriented Environments -- A Framework for Trust Enabled Software Asset Retrieval -- Opportunistic Trust Based P2P Services Framework for Disconnected MANETs -- A Risk-Aware Resource Service Decision Strategy for Global Computing -- Trustworthy Computing -- Message Race Detection for Web Services by an SMT-Based Analysis -- A User-Oriented Approach to Assessing Web Service Trustworthiness -- Improving the Trustworthiness of Service QoS Information in Service-Based Systems -- Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software -- The Testing Method for Interface Customized Component -- Trust-Related Security -- A New Monitor Model for Enhancing Trust-Based Systems -- Design and Analysis of “Flexible” k-out-of-n Signatures -- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints -- Invited Session -- Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture -- Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace -- On Alleviating Reader Collisions Towards High Efficient RFID Systems.
|
520 |
|
|
|a Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems––as well as services––available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi’an, China, October 26–29, 2010.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Information systems
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Software engineering
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Electronic data processing
|
655 |
|
7 |
|a Konferenzschrift
|y 2010
|z Xi'an
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4820003-7
|0 (DE-627)482247932
|0 (DE-576)21671561X
|a Autonomic Computing
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)7624947-5
|0 (DE-627)577733133
|0 (DE-576)285618547
|a Organic Computing
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)7562931-8
|0 (DE-627)526751819
|0 (DE-576)263014703
|a Trusted Computing
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
700 |
1 |
|
|a Branke, Jürgen
|d 1969-
|0 (DE-588)132423030
|0 (DE-627)577698249
|0 (DE-576)177358971
|4 oth
|
700 |
1 |
|
|a Sadjadi, S. Masoud
|4 oth
|
700 |
1 |
|
|a Zhang, Daqing
|4 oth
|
700 |
1 |
|
|a Zhou, Xingshe
|4 oth
|
776 |
1 |
|
|z 9783642165757
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Autonomic and trusted computing
|d Berlin : Springer, 2010
|h XV, 328 S.
|w (DE-627)635464780
|w (DE-576)332290433
|z 3642165753
|z 9783642165757
|
830 |
|
0 |
|a Lecture notes in computer science
|v 6407
|9 6407
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-16576-4
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz332858685cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20151015105546
|3 Cover
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SCS
|b 2010
|
912 |
|
|
|a ZDB-2-SXCS
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|b 2010
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
936 |
b |
k |
|a 54.72
|j Künstliche Intelligenz
|q SEPA
|0 (DE-627)10641240X
|
951 |
|
|
|a BO
|
950 |
|
|
|a Autonomes Computing
|
950 |
|
|
|a Datenverarbeitungssystem
|
950 |
|
|
|a Autonomes System
|
950 |
|
|
|a Autonomes Rechnen
|
950 |
|
|
|a Organic Computing
|
950 |
|
|
|a Informationstechnik
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Vertrauenswürdigkeit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Sealed Cloud
|
950 |
|
|
|a Rechnerorganik
|
950 |
|
|
|a Autonomic Computing
|
951 |
|
|
|b XB-CN
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-16576-4
|9 DE-14
|
852 |
|
|
|a DE-14
|z 2011-07-20T14:58:08Z
|x epn:3336561795
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-16576-4
|9 DE-15
|
852 |
|
|
|a DE-15
|z 2011-05-16T16:33:23Z
|x epn:3336561868
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-16576-4
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|z 2011-01-26T14:24:56Z
|x epn:3336561973
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-16576-4
|9 DE-520
|
852 |
|
|
|a DE-520
|z 2010-11-02T09:08:15Z
|x epn:3336562074
|
980 |
|
|
|a 1650330529
|b 0
|k 1650330529
|o 332858685
|
SOLR
_version_ |
1789359422895554560 |
access_facet |
Electronic Resources |
author |
Xie, Bing |
author2 |
Branke, Jürgen, Sadjadi, S. Masoud, Zhang, Daqing, Zhou, Xingshe |
author2_role |
oth, oth, oth, oth |
author2_variant |
j b jb, s m s sm sms, d z dz, x z xz |
author_facet |
Xie, Bing, Branke, Jürgen, Sadjadi, S. Masoud, Zhang, Daqing, Zhou, Xingshe |
author_role |
aut |
author_sort |
Xie, Bing |
author_variant |
b x bx |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
contents |
Autonomic and Organic Computing -- Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras -- A Formal Framework for Compositional Verification of Organic Computing Systems -- On-Line Adaptive Algorithms in Autonomic Restart Control -- Designing Self-healing in Automotive Systems -- Trustworthy Organic Computing Systems: Challenges and Perspectives -- AC/OC Network and Protocol -- Adaptive Control of Sensor Networks -- Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile Application Usage -- Context Based Trust Normalization in Service-Oriented Environments -- A Framework for Trust Enabled Software Asset Retrieval -- Opportunistic Trust Based P2P Services Framework for Disconnected MANETs -- A Risk-Aware Resource Service Decision Strategy for Global Computing -- Trustworthy Computing -- Message Race Detection for Web Services by an SMT-Based Analysis -- A User-Oriented Approach to Assessing Web Service Trustworthiness -- Improving the Trustworthiness of Service QoS Information in Service-Based Systems -- Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software -- The Testing Method for Interface Customized Component -- Trust-Related Security -- A New Monitor Model for Enhancing Trust-Based Systems -- Design and Analysis of “Flexible” k-out-of-n Signatures -- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints -- Invited Session -- Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture -- Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace -- On Alleviating Reader Collisions Towards High Efficient RFID Systems., Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems––as well as services––available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi’an, China, October 26–29, 2010. |
ctrlnum |
(DE-627)1650330529, (DE-576)332858685, (DE-599)BSZ332858685, (OCoLC)682101417, (OCoLC)731498725, (DE-He213)978-3-642-16576-4, (EBP)040530744 |
de15_date |
2011-05-16T16:33:23Z |
doi_str_mv |
10.1007/978-3-642-16576-4 |
era_facet |
2010 |
facet_912a |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Autonomic Computing, Organic Computing, Trusted Computing |
finc_class_facet |
Informatik, Mathematik |
finc_id_str |
0001438006 |
fincclass_txtF_mv |
science-computerscience |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2010 Xi'an (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
China |
geographic_facet |
Xi'an |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
6407 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1650330529 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer Berlin Heidelberg, 2010 |
imprint_str_mv |
Berlin, Heidelberg: Springer Berlin Heidelberg, 2010 |
institution |
DE-14, DE-Zi4, DE-520, DE-15 |
is_hierarchy_id |
0-1650330529 |
is_hierarchy_title |
Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings |
isbn |
9783642165764 |
isbn_isn_mv |
9783642165757, 3642165753 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1650330529 |
language |
English |
last_indexed |
2024-01-28T18:22:03.044Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Software engineering, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Application software., Electronic data processing, Autonomic Computing, Organic Computing, Trusted Computing |
marc024a_ct_mv |
10.1007/978-3-642-16576-4 |
match_str |
xie2010autonomicandtrustedcomputing7thinternationalconferenceatc2010xianchinaoctober26292010proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)6407 |
names_id_str_mv |
(DE-588)142557897, (DE-627)637296281, (DE-576)331601249, (DE-588)132423030, (DE-627)577698249, (DE-576)177358971 |
oclc_num |
682101417, 731498725 |
physical |
Online-Ressource (XVII, 328p. 112 illus, digital) |
publishDate |
2010 |
publishDateSort |
2010 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer Berlin Heidelberg |
record_format |
marcfinc |
record_id |
332858685 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)2462138 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 6407 |
series2 |
Lecture Notes in Computer Science ; 6407, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Xie, Bing (DE-588)142557897 (DE-627)637296281 (DE-576)331601249 aut, Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (XVII, 328p. 112 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6407, SpringerLink Bücher, Autonomic and Organic Computing -- Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras -- A Formal Framework for Compositional Verification of Organic Computing Systems -- On-Line Adaptive Algorithms in Autonomic Restart Control -- Designing Self-healing in Automotive Systems -- Trustworthy Organic Computing Systems: Challenges and Perspectives -- AC/OC Network and Protocol -- Adaptive Control of Sensor Networks -- Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile Application Usage -- Context Based Trust Normalization in Service-Oriented Environments -- A Framework for Trust Enabled Software Asset Retrieval -- Opportunistic Trust Based P2P Services Framework for Disconnected MANETs -- A Risk-Aware Resource Service Decision Strategy for Global Computing -- Trustworthy Computing -- Message Race Detection for Web Services by an SMT-Based Analysis -- A User-Oriented Approach to Assessing Web Service Trustworthiness -- Improving the Trustworthiness of Service QoS Information in Service-Based Systems -- Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software -- The Testing Method for Interface Customized Component -- Trust-Related Security -- A New Monitor Model for Enhancing Trust-Based Systems -- Design and Analysis of “Flexible” k-out-of-n Signatures -- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints -- Invited Session -- Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture -- Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace -- On Alleviating Reader Collisions Towards High Efficient RFID Systems., Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems––as well as services––available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi’an, China, October 26–29, 2010., Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Software engineering, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift 2010 Xi'an (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4820003-7 (DE-627)482247932 (DE-576)21671561X Autonomic Computing gnd, s (DE-588)7624947-5 (DE-627)577733133 (DE-576)285618547 Organic Computing gnd, s (DE-588)7562931-8 (DE-627)526751819 (DE-576)263014703 Trusted Computing gnd, DE-101, Branke, Jürgen 1969- (DE-588)132423030 (DE-627)577698249 (DE-576)177358971 oth, Sadjadi, S. Masoud oth, Zhang, Daqing oth, Zhou, Xingshe oth, 9783642165757, Buchausg. u.d.T. Autonomic and trusted computing Berlin : Springer, 2010 XV, 328 S. (DE-627)635464780 (DE-576)332290433 3642165753 9783642165757, Lecture notes in computer science 6407 6407 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-16576-4 X:SPRINGER Verlag lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz332858685cov.jpg V:DE-576 X:springer image/jpeg 20151015105546 Cover, http://dx.doi.org/10.1007/978-3-642-16576-4 DE-14, DE-14 2011-07-20T14:58:08Z epn:3336561795, http://dx.doi.org/10.1007/978-3-642-16576-4 DE-15, DE-15 2011-05-16T16:33:23Z epn:3336561868, http://dx.doi.org/10.1007/978-3-642-16576-4 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:24:56Z epn:3336561973, http://dx.doi.org/10.1007/978-3-642-16576-4 DE-520, DE-520 2010-11-02T09:08:15Z epn:3336562074 |
spellingShingle |
Xie, Bing, Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings, Lecture notes in computer science, 6407, Autonomic and Organic Computing -- Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras -- A Formal Framework for Compositional Verification of Organic Computing Systems -- On-Line Adaptive Algorithms in Autonomic Restart Control -- Designing Self-healing in Automotive Systems -- Trustworthy Organic Computing Systems: Challenges and Perspectives -- AC/OC Network and Protocol -- Adaptive Control of Sensor Networks -- Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile Application Usage -- Context Based Trust Normalization in Service-Oriented Environments -- A Framework for Trust Enabled Software Asset Retrieval -- Opportunistic Trust Based P2P Services Framework for Disconnected MANETs -- A Risk-Aware Resource Service Decision Strategy for Global Computing -- Trustworthy Computing -- Message Race Detection for Web Services by an SMT-Based Analysis -- A User-Oriented Approach to Assessing Web Service Trustworthiness -- Improving the Trustworthiness of Service QoS Information in Service-Based Systems -- Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software -- The Testing Method for Interface Customized Component -- Trust-Related Security -- A New Monitor Model for Enhancing Trust-Based Systems -- Design and Analysis of “Flexible” k-out-of-n Signatures -- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints -- Invited Session -- Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture -- Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace -- On Alleviating Reader Collisions Towards High Efficient RFID Systems., Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems––as well as services––available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi’an, China, October 26–29, 2010., Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Software engineering, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift 2010 Xi'an, Autonomic Computing, Organic Computing, Trusted Computing |
swb_id_str |
332858685 |
title |
Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings |
title_auth |
Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings |
title_full |
Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou |
title_fullStr |
Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou |
title_full_unstemmed |
Autonomic and Trusted Computing 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou |
title_in_hierarchy |
6407. Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings (2010) |
title_short |
Autonomic and Trusted Computing |
title_sort |
autonomic and trusted computing 7th international conference atc 2010 xi an china october 26 29 2010 proceedings |
title_sub |
7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings |
title_unstemmed |
Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings |
topic |
Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Software engineering, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift 2010 Xi'an, Autonomic Computing, Organic Computing, Trusted Computing |
topic_facet |
Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Software engineering, Data protection, Data encryption (Computer science), Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift, Autonomic Computing, Organic Computing, Trusted Computing |
url |
https://doi.org/10.1007/978-3-642-16576-4, https://swbplus.bsz-bw.de/bsz332858685cov.jpg, http://dx.doi.org/10.1007/978-3-642-16576-4 |