| 2008 | A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards. Xiaogang Wang, Darren Xu, Junzhou Luo |
| 2008 | A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter. Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, Bin-Yuan Huang |
| 2008 | A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily. Stefano Bistarelli, Fabio Martinelli, Francesco Santini |
| 2008 | A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments. Mohsen Taherian, Rasool Jalili, Morteza Amini |
| 2008 | A Study of Information Security Practice in a Critical Infrastructure Application. Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Stig Ole Johnsen, Irene Wærø, Odd Helge Longva, Inger Anne Tøndel |
| 2008 | A Trusted Group Signature Architecture in Virtual Computing Environment. Deqing Zou, Yunfa Li, Song Wu, Weizhong Qiang |
| 2008 | A User Behavior Based Trust Model for Mobile Applications. Zheng Yan, Valtteri Niemi, Yan Dong, Guoliang Yu |
| 2008 | A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks. Hung-Chi Chu, Yi-Ting Hsu, Yong-Hsun Lai |
| 2008 | Adaptability of the TRSIM Model to Some Changes in Agents Behaviour. Alberto Caballero, Juan A. Botía, Antonio Fernandez Gómez-Skarmeta |
| 2008 | Adjustable Trust Model for Access Control. Maryna Komarova, Michel Riguidel |
| 2008 | An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL. Mike Hinchey, Emil Vassev |
| 2008 | An Integrated Solution for Policy Filtering and Traffic Anomaly Detection. Zhijun Wang, Hao Che, Jiannong Cao |
| 2008 | An Operating System Architecture for Organic Computing in Embedded Real-Time Systems. Florian Kluge, Jörg Mische, Sascha Uhrig, Theo Ungerer |
| 2008 | Annotation Markers for Runtime Replication Protocol Selection. Hein Meling |
| 2008 | Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots. Bojan Jakimovski, Erik Maehle |
| 2008 | Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments. Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang |
| 2008 | Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang, Jianhua Ma |
| 2008 | Autonomous Querying for Knowledge Networks. Kieran Greer, Matthias Baumgarten, Chris D. Nugent, Maurice D. Mulvenna, Kevin Curran |
| 2008 | Concepts for Autonomous Control Flow Checking for Embedded CPUs. Daniel Ziener, Jürgen Teich |
| 2008 | Cooperative Management Framework for Inter-domain Routing System. Ning Hu, Peng Zou, Peidong Zhu, Xin Liu |
| 2008 | Design, Prototype, and Evaluation of a Network Monitoring Library. Karl-André Skevik, Vera Goebel, Thomas Plagemann |
| 2008 | Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. Jianhua Yang, Byong Lee |
| 2008 | Di-GAFR: Directed Greedy Adaptive Face-Based Routing. Tao Yang, Ye Huang, Jianxin Chen, Geng Yang, Chunming Rong |
| 2008 | Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database. Juryon Paik, Junghyun Nam, Hee Yong Youn, Ung-Mo Kim |
| 2008 | Distributed Performance Control in Organic Embedded Systems. Steffen Stein, Rolf Ernst |
| 2008 | Embedding Dynamic Behaviour into a Self-configuring Software System. Paul Ward, Mariusz Pelc, James Hawthorne, Richard John Anthony |
| 2008 | Enhanced Three-Round Smart Card-Based Key Exchange Protocol. Eun-Jun Yoon, Kee-Young Yoo |
| 2008 | Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server. Lin-Huang Chang, Chun-Hui Sung, Shih-Yi Chiu, Jiun-Jian Liaw |
| 2008 | Managing Contracts in Pleiades Using Trust Management. Christoffer Norvik, John P. Morrison, Dan C. Marinescu, Chen Yu, Gabriela M. Marinescu, Howard Jay Siegel |
| 2008 | Maximising Personal Utility Using Intelligent Strategy in Minority Game. Yingni She, Ho-fung Leung |
| 2008 | Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation. Christoph Dorn, Hong Linh Truong, Schahram Dustdar |
| 2008 | Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. Sirui Yang, Hai Jin, Xiaofei Liao, Sanmin Liu |
| 2008 | Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi |
| 2008 | Organic Control of Traffic Lights. Holger Prothmann, Fabian Rochner, Sven Tomforde, Jürgen Branke, Christian Müller-Schloer, Hartmut Schmeck |
| 2008 | Performance Problem Determination Using Combined Dependency Analysis for Reliable System. Shunshan Piao, Jeongmin Park, Eunseok Lee |
| 2008 | Preventing DDoS Attacks Based on Credit Model for P2P Streaming System. Jun Yang, Ying Li, Benxiong Huang, Jiuqiang Ming |
| 2008 | Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN. Gaeil An, Kiyoung Kim |
| 2008 | SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. Zhengxin Lu, Chen Huang, Furong Wang, Chunming Rong |
| 2008 | Scheduling for Reliable Execution in Autonomic Systems. Terry Tidwell, Robert Glaubius, Christopher D. Gill, William D. Smart |
| 2008 | Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes. Armando Astarloa, Unai Bidarte, Jaime Jimenez, Jesús Lázaro, Iñigo Martínez de Alegría |
| 2008 | Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations. Martin Gilje Jaatun, Tor Olav Grøtan, Maria B. Line |
| 2008 | Self-reconfiguration in Highly Available Pervasive Computing Systems. Hadi Hemmati, Rasool Jalili |
| 2008 | Sensor Network Applications Implemented by Industry and Their Security Challenges. Erdal Cayirci |
| 2008 | SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks. Xiaowei Chen, Kaiyong Zhao, Xiaowen Chu |
| 2008 | Service Discovery of IP Cameras Using SIP and Zeroconf Protocols. Yi-Chih Tung, Chien-Min Ou, Wen-Jyi Hwang, Wei-De Wu |
| 2008 | Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation. Hiroyuki Eto, Tadashi Dohi, Jianhua Ma |
| 2008 | Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering. Chunmei Gui, Quanyuan Wu, Huaimin Wang, Jian Qiang |
| 2008 | Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks. Reinhard Mörgenthaler, Markus Zeller, Josef Jiru |
| 2008 | Trusting Groups in Coalition Formation Using Social Distance. Peter Shaw, Paul Sage, Peter Milligan |
| 2008 | Using Automated Planning for Trusted Self-organising Organic Computing Systems. Benjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer |
| 2008 | Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network. Furong Wang, Yipeng Qu, Baoming Bai, Fan Zhang, Chen Huang |
| 2008 | Web Search Results Clustering Based on a Novel Suffix Tree Structure. Junze Wang, Yijun Mo, Benxiong Huang, Jie Wen, Li He |
| 2008 | Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems. Yue-Shan Chang, Tong-Ying Juang, Chen-Yi Su |