ATC C

58 papers

YearTitle / Authors
2007A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints.
Shieh-Shing Lin
2007A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid.
Yunfa Li, Hai Jin, Deqing Zou, Jieyun Chen, Zongfen Han
2007A Distributed Self-healing Data Store.
Wolfgang Trumler, Jörg Ehrig, Andreas Pietzowski, Benjamin Satzger, Theo Ungerer
2007A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling.
Congfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao
2007A Generic and Modular System Architecture for Trustworthy, Autonomous Applications.
George Brancovici, Christian Müller-Schloer
2007A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block.
Wenyuan Kuang, Yaoxue Zhang, Li Wei, Nan Xia, Guangbin Xu, Yue-Zhi Zhou
2007A Prediction-Based Fair Replication Algorithm in Structured P2P Systems.
Xianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang
2007A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection.
Yoon-Hwa Choi, Myeong-Hyeon Lee
2007A Secret-Key Exponential Key Agreement Protocol with Smart Cards.
Eun-Jun Yoon, Kee-Young Yoo
2007A Secure DRM Framework for User's Domain and Key Management.
Jin-Heung Lee, Sanggon Lee, Sanguk Shin
2007A Trust Evolution Model for P2P Networks.
Yuan Wang, Ye Tao, Ping Yu, Feng Xu, Jian Lü
2007A Wearable System for Outdoor Running Workout State Recognition and Course Provision.
Katsuhiro Takata, Masataka Tanaka, Jianhua Ma, Runhe Huang, Bernady O. Apduhan, Norio Shiratori
2007A Worm Containment Model Based on Neighbor-Alarm.
Jianming Fu, Binglan Chen, Huanguo Zhang
2007AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks.
Zhi (Judy) Fu, Minho Shin, John C. Strassner, Nitin Jain, Vishnu Ram, William A. Arbaugh
2007An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System.
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai
2007An Adaptive Trust Control Model for a Trustworthy Component Software Platform.
Zheng Yan, Christian Prehofer
2007An Approach to a Trustworthy System Architecture Using Virtualization.
Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert
2007An Architecture for Self-healing Autonomous Object Groups.
Hein Meling
2007An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack.
DongHyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won
2007An Enhanced DGIDE Platform for Intrusion Detection.
Fang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, Jia-Chun Lin
2007An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing.
Keith C. C. Chan
2007Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings
Bin Xiao, Laurence Tianruo Yang, Jianhua Ma, Christian Müller-Schloer, Yu Hua
2007Biology as Inspiration Towards a Novel Service Life-Cycle.
David Linner, Heiko Pfeffer, Ilja Radusch, Stephan Steglich
2007Building Autonomic and Secure Service Oriented Architectures with MAWeS.
Valentina Casola, Emilio Pasquale Mancini, Nicola Mazzocca, Massimiliano Rak, Umberto Villano
2007Calculating Trust Using Aggregation Rules in Social Networks.
Sanguk Noh
2007Cooperative Component Testing Architecture in Collaborating Network Environment.
Gaeil An, Joon S. Park
2007Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.
Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin
2007Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.
Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li
2007CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks.
Ruichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen
2007Defending Against Jamming Attacks in Wireless Local Area Networks.
Wei Chen, Danwei Chen, Guozi Sun, Yingzhou Zhang
2007Design of Service-Based Systems with Adaptive Tradeoff Between Security and Service Delay.
Stephen S. Yau, Min Yan, Dazhi Huang
2007Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
Yong Yu, Bo Yang, Xinyi Huang, Mingwu Zhang
2007Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.
Mooseop Kim, Youngse Kim, JaeCheol Ryou, Sungik Jun
2007Enhancing Grid Security Using Trusted Virtualization.
Hans Löhr, Harigovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble
2007Establishing Trust Between Mail Servers to Improve Spam Filtering.
Jimmy McGibney, Dmitri Botvich
2007Final Fantasy - Securing On-Line Gaming with Trusted Computing.
Shane Balfe, Anish Mohammed
2007Formal Analysis of Secure Bootstrap in Trusted Computing.
Shuyi Chen, Yingyou Wen, Hong Zhao
2007Generating Simplified Regular Expression Signatures for Polymorphic Worms.
Yong Tang, Xicheng Lu, Bin Xiao
2007Identity-Based Proxy Signature from Pairings.
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang
2007Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System.
So-Young Yeo, Myung-Sun Baek, Hyoung-Kyu Song
2007Key Establishment Scheme for Sensor Networks with Low Communication Cost.
Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee
2007Malicious Codes Detection Based on Ensemble Learning.
Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang
2007Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
Emmanuel Bresson, Mark Manulis
2007Middleware Based Context Management for the Component-Based Pervasive Computing.
Di Zheng, Jun Wang, Yan Jia, Weihong Han, Peng Zou
2007Novel Remote User Authentication Scheme Using Bilinear Pairings.
Chen Yang, Wenping Ma, Xinmei Wang
2007On the Homonymous Role in Role-Based Discretionary Access Control.
Kai Ouyang, Xiaowen Chu, Yixin Jiang, Hsiao-Hwa Chen, Jiangchuan Liu
2007Ontology Based Hybrid Access Control for Automatic Interoperation.
Yuqing Sun, Peng Pan, Ho-fung Leung, Bin Shi
2007Provably Secure Identity-Based Threshold Unsigncryption Scheme.
Bo Yang, Yong Yu, Fagen Li, Ying Sun
2007Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding.
Kuo-Lung Hung, Chin-Chen Chang
2007Remarks on Self-organization and Trust in Organic Computing Systems.
Hartmut Schmeck
2007Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms.
Jun Luo, Li Ding, Zhisong Pan, Guiqiang Ni, Guyu Hu
2007SPA Countermeasure Based on Unsigned Left-to-Right Recodings.
Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim
2007Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels.
Jun Li, Fumin Yang, Gang Tu, Wan-hua Cao, Yansheng Lu
2007Service-Context Knowledge-Based Solution for Autonomic Adaptation.
Marcel Cremene, Michel Riveill
2007Stepping-Stone Detection Via Request-Response Traffic Analysis.
Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang
2007Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach.
Chunmei Gui, Quanyuan Wu, Huaimin Wang
2007TransCom: A Virtual Disk Based Self-management System.
Li Wei, Yaoxue Zhang, Yue-Zhi Zhou
2007ZigBee Security Using Identity-Based Cryptography.
Son Thanh Nguyen, Chunming Rong