International Conference on Autonomic and Trusted Computing最新文献

筛选
英文 中文
Safe Runtime Validation of Behavioral Adaptations in Autonomic Software 自主软件中行为适应的安全运行时验证
International Conference on Autonomic and Trusted Computing Pub Date : 2011-09-02 DOI: 10.1007/978-3-642-23496-5_3
Tariq M. King, Andrew A. Allen, R. Cruz, Peter J. Clarke
{"title":"Safe Runtime Validation of Behavioral Adaptations in Autonomic Software","authors":"Tariq M. King, Andrew A. Allen, R. Cruz, Peter J. Clarke","doi":"10.1007/978-3-642-23496-5_3","DOIUrl":"https://doi.org/10.1007/978-3-642-23496-5_3","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123146044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Hierarchical-CPK-Based Trusted Computing Cryptography Scheme 基于层次cpp的可信计算加密方案
International Conference on Autonomic and Trusted Computing Pub Date : 2011-09-02 DOI: 10.1007/978-3-642-23496-5_11
Fajiang Yu, Tong Li, Yang Lin, Huanguo Zhang
{"title":"Hierarchical-CPK-Based Trusted Computing Cryptography Scheme","authors":"Fajiang Yu, Tong Li, Yang Lin, Huanguo Zhang","doi":"10.1007/978-3-642-23496-5_11","DOIUrl":"https://doi.org/10.1007/978-3-642-23496-5_11","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114348699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Spam Detection on Twitter Using Traditional Classifiers 利用传统分类器检测Twitter上的垃圾邮件
International Conference on Autonomic and Trusted Computing Pub Date : 2011-09-02 DOI: 10.1007/978-3-642-23496-5_13
M. McCord, M. Chuah
{"title":"Spam Detection on Twitter Using Traditional Classifiers","authors":"M. McCord, M. Chuah","doi":"10.1007/978-3-642-23496-5_13","DOIUrl":"https://doi.org/10.1007/978-3-642-23496-5_13","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114781031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 304
Towards a Protocol for Autonomic Covert Communication 自主隐蔽通信协议研究
International Conference on Autonomic and Trusted Computing Pub Date : 2011-09-02 DOI: 10.1007/978-3-642-23496-5_8
Wanqi Li, Guanglei He
{"title":"Towards a Protocol for Autonomic Covert Communication","authors":"Wanqi Li, Guanglei He","doi":"10.1007/978-3-642-23496-5_8","DOIUrl":"https://doi.org/10.1007/978-3-642-23496-5_8","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"9 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Survey of Security Issues in Trust and Reputation Systems for E-Commerce 电子商务信任与声誉系统中的安全问题研究
International Conference on Autonomic and Trusted Computing Pub Date : 2011-09-02 DOI: 10.1007/978-3-642-23496-5_15
S. Spitz, Y. Tüchelmann
{"title":"A Survey of Security Issues in Trust and Reputation Systems for E-Commerce","authors":"S. Spitz, Y. Tüchelmann","doi":"10.1007/978-3-642-23496-5_15","DOIUrl":"https://doi.org/10.1007/978-3-642-23496-5_15","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126801536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Autonomous Online Expansion Technology for Wireless Sensor Network Based Manufacturing System 基于无线传感器网络的制造系统自主在线扩展技术
International Conference on Autonomic and Trusted Computing Pub Date : 2011-09-02 DOI: 10.1007/978-3-642-23496-5_9
M. Haque, Fan Wei, T. Gouda, Xiaodong Lu, K. Mori
{"title":"Autonomous Online Expansion Technology for Wireless Sensor Network Based Manufacturing System","authors":"M. Haque, Fan Wei, T. Gouda, Xiaodong Lu, K. Mori","doi":"10.1007/978-3-642-23496-5_9","DOIUrl":"https://doi.org/10.1007/978-3-642-23496-5_9","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Copyright Protection in P2P Networks by False Pieces Pollution 伪片污染下的P2P网络版权保护
International Conference on Autonomic and Trusted Computing Pub Date : 2011-09-02 DOI: 10.1007/978-3-642-23496-5_16
Chun-Hsin Wang, Chuang-Yang Chiu
{"title":"Copyright Protection in P2P Networks by False Pieces Pollution","authors":"Chun-Hsin Wang, Chuang-Yang Chiu","doi":"10.1007/978-3-642-23496-5_16","DOIUrl":"https://doi.org/10.1007/978-3-642-23496-5_16","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132257150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Virtualization with Automated Services Catalog for Providing Integrated Information Technology Infrastructure 提供集成信息技术基础设施的自动化服务目录虚拟化
International Conference on Autonomic and Trusted Computing Pub Date : 2011-09-02 DOI: 10.1007/978-3-642-23496-5_6
R. D. O. Albuquerque, L. J. Garcia-Villalba, Osmar Ribeiro Torres, Flavio E. de Deus
{"title":"Virtualization with Automated Services Catalog for Providing Integrated Information Technology Infrastructure","authors":"R. D. O. Albuquerque, L. J. Garcia-Villalba, Osmar Ribeiro Torres, Flavio E. de Deus","doi":"10.1007/978-3-642-23496-5_6","DOIUrl":"https://doi.org/10.1007/978-3-642-23496-5_6","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132414854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing OpenID through a Reputation Framework 通过声誉框架增强OpenID
International Conference on Autonomic and Trusted Computing Pub Date : 2011-09-02 DOI: 10.1007/978-3-642-23496-5_1
Félix Gómez Mármol, M. Kuhnen, G. Pérez
{"title":"Enhancing OpenID through a Reputation Framework","authors":"Félix Gómez Mármol, M. Kuhnen, G. Pérez","doi":"10.1007/978-3-642-23496-5_1","DOIUrl":"https://doi.org/10.1007/978-3-642-23496-5_1","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":" 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113949376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Facilitating the Use of TPM Technologies Using the Serenity Framework 通过Serenity框架促进TPM技术的使用
International Conference on Autonomic and Trusted Computing Pub Date : 2011-09-02 DOI: 10.1007/978-3-642-23496-5_12
A. Muñoz, A. Maña
{"title":"Facilitating the Use of TPM Technologies Using the Serenity Framework","authors":"A. Muñoz, A. Maña","doi":"10.1007/978-3-642-23496-5_12","DOIUrl":"https://doi.org/10.1007/978-3-642-23496-5_12","url":null,"abstract":"","PeriodicalId":149713,"journal":{"name":"International Conference on Autonomic and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128026182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信