ATC C

60 papers

YearTitle / Authors
2006A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications.
Chenlin Huang, Huaping Hu, Zhiying Wang
2006A Framework for Specifying and Managing Security Requirements in Collaborative Systems.
Stephen S. Yau, Zhaoji Chen
2006A Group Based Reputation System for P2P Networks.
Huirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng
2006A New ID-Based Broadcast Encryption Scheme.
Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang
2006A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems.
Junaid Ahsenali Chaudhry, Seungkyu Park
2006A Novel Rate Limit Algorithm Against Meek DDoS Attacks.
Yinan Jing, Xueping Wang, Xiaochun Xiao, Gendu Zhang
2006A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization.
Laurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn
2006A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates.
Ming Li, Shengquan Wang, Wei Zhao
2006A Risk Assessment Model for Enterprise Network Security.
Fu-Hong Yang, Chi-Hung Chi, Lin Liu
2006A SCORM-Based Caching Strategy for Supporting Ubiquitous Learning Environment.
Yun-Long Sie, Te-Hua Wang, Hsuan-Pu Chang, Shu-Nu Chang, Timothy K. Shih
2006A Security Management Framework with Roaming Coordinator for Pervasive Services.
Minsoo Lee, Sehyun Park, Sungik Jun
2006A Social Network-Based Trust Model for the Semantic Web.
Yu Zhang, Huajun Chen, Zhaohui Wu
2006A Time-Cognizant Dynamic Crash Recovery Scheme Suitable for Distributed Real-Time Main Memory Databases.
Yingyuan Xiao, Yunsheng Liu, Xiangyang Chen, Xiaofeng Liu
2006Active Fault-Tolerant System for Open Distributed Computing.
Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida
2006An Access-Control Policy Based on Sharing Resource Management for a Multi-domains Environment.
Hong Zhu, Sujuan Duan, Fan Hong, Kevin Lü
2006An Approach for Trusted Interoperation in a Multidomain Environment.
Yuqing Sun, Peng Pan, Xiangxu Meng
2006An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
Iuon-Chang Lin, Chin-Chen Chang
2006An Improved Global Trust Value Computing Method in P2P System.
Fajiang Yu, Huanguo Zhang, Fei Yan, Song Gao
2006An Integration Framework for Trustworthy Transactions.
Yonghwan Lee, Dugki Min
2006Automated Abduction for Computer Forensics.
Andrei Doncescu, Katsumi Inoue
2006Automatic Composition of Secure Workflows.
Marc Lelarge, Zhen Liu, Anton Riabov
2006Autonomic Group Location Update for Mobile Networks.
Lai Tu, Furong Wang, Fan Zhang, Jian Zhang
2006Autonomic Interference Avoidance with Extended Shortest Path Algorithm.
Yong Cui, Hao Che, Constantino M. Lagoa, ZhiMei Zheng
2006Autonomic K-Interleaving Construction Scheme for P2P Overlay Networks.
Khaled Ragab, Akinori Yonezawa
2006Autonomic Trust Management in a Component Based Software System.
Zheng Yan, Ronan MacLaverty
2006Autonomic and Trusted Computing Paradigms.
Xiaolin Li, Hui Kang, Patrick Harrington, Johnson Thomas
2006Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings
Laurence Tianruo Yang, Hai Jin, Jianhua Ma, Theo Ungerer
2006Bayesian Network Based Trust Management.
Yong Wang, Vinny Cahill, Elizabeth Gray, Colin Harris, Lejian Liao
2006Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology.
Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou
2006Development and Runtime Support for Situation-Aware Security in Autonomic Computing.
Stephen S. Yau, Yisheng Yao, Min Yan
2006Efficient Signcryption Without Random Oracles.
Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
2006Emergence in Organic Computing Systems: Discussion of a Controversial Concept.
Christian Müller-Schloer, Bernhard Sick
2006Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project.
Pierpaolo Dondio, Stephen Barrett, Stefan Weber, Jean-Marc Seigneur
2006FTCM: Fault-Tolerant Cluster Management for Cluster-Based DBMS.
Jae-Woo Chang, Young-Chang Kim
2006Fault-Tolerant Scheduling Based on Periodic Tasks for Heterogeneous Systems.
Wei Luo, Fumin Yang, Liping Pang, Xiao Qin
2006Formal Modeling and Verification of Systems with Self-x Properties.
Matthias Güdemann, Frank Ortmeier, Wolfgang Reif
2006From Components to Autonomic Elements Using Negotiable Contracts.
Hervé Chang, Philippe Collet, Alain Ozanne, Nicolas Rivierre
2006Fuzzy Model Tuning for Intrusion Detection Systems.
Zhenwei Yu, Jeffrey J. P. Tsai
2006Interference-Aware Selfish Routing in Multi-ratio Multi-channel Wireless Mesh Networks.
Yanxiang He, Jun Xiao, Naixue Xiong, Laurence Tianruo Yang
2006MTrust: A Reputation-Based Trust Model for a Mobile Agent System.
Suphithat Songsiri
2006Managing Trust in Distributed Agent Systems.
Stephen S. Yau
2006Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems.
A. Reza Haydarlou, Benno J. Overeinder, Michel A. Oey, Frances M. T. Brazier
2006On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption.
Christian Veigner, Chunming Rong
2006PATROL-F - A Comprehensive Reputation-Based Trust Model with Fuzzy Subsystems.
Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab, Hassan Artail
2006Remote Authentication with Forward Security.
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
2006Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone.
Yongzhong Zhang, Jianhua Yang, Chunming Ye
2006Self Awareness and Adaptive Traffic Signal Control System for Smart World.
Lawrence Y. Deng, Dong-Liang Lee
2006Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services.
Xiaowen Chu, Yixin Jiang, Chuang Lin, Fujun Feng
2006Self-configuration Via Cooperative Social Behavior.
Wolfgang Trumler, Robert Klaus, Theo Ungerer
2006Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters.
Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li
2006System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks.
Won Jay Song, Im Sook Há, Mun Kee Choi
2006TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System.
Sirui Yang, Hai Jin, Xuping Tu
2006TPOD: A Trust-Based Incentive Mechanism for Peer-to-Peer Live Broadcasting.
Yun Tang, Lifeng Sun, Jian-Guang Luo, Shiqiang Yang, Yuzhuo Zhong
2006Toward Trust Management in Autonomic and Coordination Applications.
Yuan Wang, Feng Xu, Ye Tao, Chun Cao, Jian Lü
2006Towards Ontology-Based Embedded Services.
Ghadi Mahmoudi, Christian Müller-Schloer
2006Towards a Standards-Based Autonomic Context Management System.
Jadwiga Indulska, Karen Henricksen, Peizhao Hu
2006Trusted Priority Control Design for Information Networks Based on Sociotechnology.
Noriaki Yoshikai
2006Two Novel Packet Marking Schemes for IP Traceback.
Hanping Hu, Yi Wang, Lingfei Wang, Wenxuan Guo, Mingyue Ding
2006Ubisafe Computing: Vision and Challenges (I).
Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde Cheng, Laurence Tianruo Yang, Runhe Huang, Qun Jin
2006Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang