Autonomic and Trusted Computing: 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, ProceedingsBin Xiao No fewer than 55 revised full papers are presented in this volume, all given at the 4th International Conference on Autonomic and Trusted Computing, held in Hong Kong, China in July 2007. The papers, presented together with one keynote lecture, were carefully reviewed and selected from 223 submissions. The papers are organized in topical sections on, among others, cryptography and signatures, autonomic computing and services, and secure and trusted computing. |
Contents
An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing | 1 |
Remarks on Selforganization and Trust in Organic Computing Systems | 2 |
ZigBee Security Using IdentityBased Cryptography | 3 |
Efficient IdentityBased Signcryption Scheme for Multiple Receivers | 13 |
IdentityBased Proxy Signature from Pairings | 22 |
Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection | 32 |
A Digital Signature Mechanism and AuthenticationScheme for Group Communication in Grid | 42 |
Cryptanalysis of ServerAided RSA Key Generation Protocols at MADNES 2005 | 52 |
A New OneWay Isolation FileAccess Method at the Granularity of a DiskBlock | 296 |
Novel Remote User Authentication Scheme Using Bilinear Pairings | 306 |
On the Homonymous Role in RoleBased Discretionary Access Control | 313 |
Ontology Based Hybrid Access Control for Automatic Interoperation | 323 |
Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding | 333 |
A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints | 344 |
Formal Analysis of Secure Bootstrap in Trusted Computing | 352 |
Calculating Trust Using Aggregation Rules in Social Networks | 361 |
ServiceContext KnowledgeBased Solution for Autonomic Adaptation | 61 |
Middleware Based Context Management for the ComponentBased Pervasive Computing | 71 |
Building Autonomic and Secure Service Oriented Architectures with MAWeS | 82 |
Biology as Inspiration Towards a Novel Service LifeCycle | 94 |
Design of ServiceBased Systems with Adaptive Tradeoff Between Security and Service Delay | 103 |
Provably Secure IdentityBased Threshold Unsigncryption Scheme | 114 |
Final Fantasy Securing OnLine Gaming with Trusted Computing | 123 |
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack | 135 |
Establishing Trust Between Mail Servers to Improve Spam Filtering | 146 |
An Architecture for Selfhealing Autonomous Object Groups | 156 |
A Generic and Modular System Architecture for Trustworthy Autonomous Applications | 169 |
Cooperative Component Testing Architecture in Collaborating Network Environment | 179 |
An Approach to a Trustworthy System Architecture Using Virtualization | 191 |
A Global ReputationBased Trust Model in PeertoPeer Networks | 203 |
A Trust Evolution Model for P2P Networks | 216 |
An Adaptive Trust Control Model for a Trustworthy Component Software Platform | 226 |
A Fuzzy Reputation Aggregation Approach | 239 |
An Adaptive Spreading Activation Approach to Combating the FrontPeer Attack in Trust and Reputation System | 249 |
Research on CostSensitive Learning in OneClass Anomaly Detection Algorithms | 259 |
Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System | 269 |
SteppingStone Detection Via RequestResponse Traffic Analysis | 276 |
SPA Countermeasure Based on Unsigned LefttoRight Recodings | 286 |
Enhancing Grid Security Using Trusted Virtualization | 372 |
A Wearable System for Outdoor Running Workout State Recognition and Course Provision | 385 |
Key Control and Contributiveness in the Shadow of Trust | 395 |
Efficient Implementation of the KeyedHash Message Authentication Code Based on SHA1 Algorithm for Mobile Trusted Computing | 410 |
A Secure DRM Framework for Users Domain and Key Management | 420 |
A SecretKey Exponential Key Agreement Protocol with Smart Cards | 430 |
Key Establishment Scheme for Sensor Networks with Low Communication Cost | 441 |
A Worm Containment Model Based on NeighborAlarm | 449 |
A Distributed Selfhealing Data Store | 458 |
Malicious Codes Detection Based on Ensemble Learning | 468 |
Generating Simplified Regular Expression Signatures for Polymorphic Worms | 478 |
AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks | 489 |
A PredictionBased Fair Replication Algorithm in Structured P2P Systems | 499 |
A Virtual Disk Based Selfmanagement System | 509 |
Defending Against Jamming Attacks in Wireless Local Area Networks | 519 |
Schedulability Analysis of the FaultTolerant Hard RealTime Tasks with Limited Priority Levels | 529 |
A PropertyBased Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection | 539 |
A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling | 549 |
An Enhanced DGIDE Platform for Intrusion Detection | 559 |
569 | |
Other editions - View all
Common terms and phrases
access control adaptive algorithm applications architecture autonomic Berlin Heidelberg 2007 bilinear pairings Bloom filter ciphertext client component configuration context control modes cryptography decryption defined detection detector device digital signature dispatcher distributed domain downloaded efficient encryption entity environment evaluation execution function grid group key group signature hash function Heidelberg HMAC homonymous role ID-based identity-based IEEE implementation input integrity jamming attacks LNCS malicious peers mechanism method middleware node operation optimal oracle output packets paper parameters performance platform private key problem Proc proposed protocol proxy signature public key public-key cryptography queries random recoding replication reputation request resource scheduling sensor server signcryption simulation smart card spam Springer storage stored task Technology trust metrics Trusted Computing Trusted Computing Group trustworthiness VDisk verify worm ZigBee