| 000 | 04844nam a22006255i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-16576-4 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084549.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 101030s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642165764 _9978-3-642-16576-4 |
||
| 024 | 7 |
_a10.1007/978-3-642-16576-4 _2doi |
|
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aUR _2bicssc |
|
| 072 | 7 |
_aUTN _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aXie, Bing. _eeditor. |
|
| 245 | 1 | 0 |
_aAutonomic and Trusted Computing _h[electronic resource] : _b7th International Conference, ATC 2010, Xi’an, China, October 26-29, 2010. Proceedings / _cedited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aXVII, 328p. 112 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6407 |
|
| 505 | 0 | _aAutonomic and Organic Computing -- Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras -- A Formal Framework for Compositional Verification of Organic Computing Systems -- On-Line Adaptive Algorithms in Autonomic Restart Control -- Designing Self-healing in Automotive Systems -- Trustworthy Organic Computing Systems: Challenges and Perspectives -- AC/OC Network and Protocol -- Adaptive Control of Sensor Networks -- Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile Application Usage -- Context Based Trust Normalization in Service-Oriented Environments -- A Framework for Trust Enabled Software Asset Retrieval -- Opportunistic Trust Based P2P Services Framework for Disconnected MANETs -- A Risk-Aware Resource Service Decision Strategy for Global Computing -- Trustworthy Computing -- Message Race Detection for Web Services by an SMT-Based Analysis -- A User-Oriented Approach to Assessing Web Service Trustworthiness -- Improving the Trustworthiness of Service QoS Information in Service-Based Systems -- Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software -- The Testing Method for Interface Customized Component -- Trust-Related Security -- A New Monitor Model for Enhancing Trust-Based Systems -- Design and Analysis of “Flexible” k-out-of-n Signatures -- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints -- Invited Session -- Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture -- Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace -- On Alleviating Reader Collisions Towards High Efficient RFID Systems. | |
| 520 | _aThis book constitutes the refereed proceedings of the 7th International Conference on Autonomic and Trusted Computing, ATC 2010, held in Xi'an, China, in October 2010. The 20 revised full papers presented together with 3 invited papers and 2 keynote abstracts were carefully reviewed and selected from 68 submissions. The papers address all current issues in autonomic, organic, and trusted computing, with special focus on theory and models, architectures and systems, components and modules, communication and services, as well as on tools and interfaces. They also feature actual research on trust models and specifications, trust-related security and privacy, trusted reliable and dependable systems, trustworthy services and applications, plus trust standards and non-technical issues. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aSoftware engineering. | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aInformation systems. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aSoftware Engineering. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 700 | 1 |
_aBranke, Juergen. _eeditor. |
|
| 700 | 1 |
_aSadjadi, S. Masoud. _eeditor. |
|
| 700 | 1 |
_aZhang, Daqing. _eeditor. |
|
| 700 | 1 |
_aZhou, Xingshe. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642165757 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6407 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-16576-4 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c112846 _d112846 |
||