LEADER 01251nam2 22002893i 450 001 TSA0001015 005 20251003044414.0 010 $a8802027889 100 $a20120214d1981 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aˆ20: ‰Asia centrale e Giappone$fM. Bussagli, L. Petech, M. Muccioli 210 $aTorino$cUnione tipografico-editrice torinese$d©1970$hstampa 1981 215 $aXVIII, 720 p., [108! p. di tav.$cill.$d25 cm. 461 1$1001CFI0014831$12001 $aNuova storia universale dei popoli e delle civiltà$v20 700 1$aBussagli$b, Mario$f <1917-1988>$3CFIV015096$4070$034070 701 1$aPetech$b, Luciano$3CFIV043686$4070$061052 701 1$aMuccioli$b, Marcello$3RAVV032343$4070$0452327 801 3$aIT$bIT-000000$c20120214 850 $aIT-BN0095 $aIT-AV0003 $aIT-CE0066 $aIT-NA0261 $aIT-AV0045 912 $aTSA0001015 950 2$aBiblioteca Centralizzata di Ateneo$cv. 1-20$d 01STORICA 15 NUOSUD$e 01AR 0070033815 VMA (0020 v. 20$fB $h20250723$i20250723 977 $a 01$a AR$a CV$a FT$a MV 996 $aAsia centrale e Giappone$91056192 997 $aUNISANNIO LEADER 08002nam 22008775 450 001 9910484701903321 005 20251226200349.0 010 $a3-540-73547-X 024 7 $a10.1007/978-3-540-73547-2 035 $a(CKB)1000000000490358 035 $a(SSID)ssj0000316415 035 $a(PQKBManifestationID)11212886 035 $a(PQKBTitleCode)TC0000316415 035 $a(PQKBWorkID)10281801 035 $a(PQKB)11525277 035 $a(DE-He213)978-3-540-73547-2 035 $a(MiAaPQ)EBC3063191 035 $a(MiAaPQ)EBC6707155 035 $a(Au-PeEL)EBL6707155 035 $a(PPN)123163633 035 $a(BIP)32371958 035 $a(BIP)14225333 035 $a(EXLCZ)991000000000490358 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAutonomic and Trusted Computing $e4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings /$fedited by Bin Xiao, Laurence T. Yang, Christian Muller-Schloer, Yu Hua 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XVIII, 574 p.) 225 1 $aProgramming and Software Engineering,$x2945-9168 ;$v4610 300 $aInternational conference proceedings. 311 08$a3-540-73546-1 320 $aIncludes bibliographical references and index. 327 $aKeynote Speech -- An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing -- Remarks on Self-organization and Trust in Organic Computing Systems -- Cryptography and Signatures -- ZigBee Security Using Identity-Based Cryptography -- Efficient Identity-Based Signcryption Scheme for Multiple Receivers -- Identity-Based Proxy Signature from Pairings -- Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection -- A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid -- Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005 -- Autonomic Computing and Services -- Service-Context Knowledge-Based Solution for Autonomic Adaptation -- Middleware Based Context Management for the Component-Based Pervasive Computing -- Building Autonomic and Secure Service Oriented Architectures with MAWeS -- Biology as Inspiration Towards a Novel Service Life-Cycle -- Design of Service?Based Systems with Adaptive Tradeoff Between Security and Service Delay -- Secure and Trusted Computing -- Provably Secure Identity-Based Threshold Unsigncryption Scheme -- Final Fantasy ? Securing On-Line Gaming with Trusted Computing -- An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack -- Establishing Trust Between Mail Servers to Improve Spam Filtering -- Autonomic Models and Architectures -- An Architecture for Self-healing Autonomous Object Groups -- A Generic and Modular System Architecture for Trustworthy, Autonomous Applications -- Cooperative Component Testing Architecture in Collaborating Network Environment -- An Approach to a Trustworthy System Architecture Using Virtualization -- Trusted Models and Systems -- CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks -- A TrustEvolution Model for P2P Networks -- An Adaptive Trust Control Model for a Trustworthy Component Software Platform -- Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach -- Intrusion Detection -- An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System -- Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms -- Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System -- Stepping-Stone Detection Via Request-Response Traffic Analysis -- SPA Countermeasure Based on Unsigned Left-to-Right Recodings -- Access Control -- A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block -- Novel Remote User Authentication Scheme Using Bilinear Pairings -- On the Homonymous Role in Role-Based Discretionary Access Control -- Ontology Based Hybrid Access Control for Automatic Interoperation -- Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding -- Trusted Computing and Communications -- A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints -- Formal Analysis of Secure Bootstrap in Trusted Computing -- Calculating Trust Using Aggregation Rules in Social Networks -- Enhancing Grid Security Using Trusted Virtualization -- A Wearable System for Outdoor Running Workout State Recognition and Course Provision -- Key Management -- Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust -- Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing -- A Secure DRM Framework for User?s Domain and Key Management -- A Secret-Key Exponential Key AgreementProtocol with Smart Cards -- Key Establishment Scheme for Sensor Networks with Low Communication Cost -- Worm Detection and Data Security -- A Worm Containment Model Based on Neighbor-Alarm -- A Distributed Self-healing Data Store -- Malicious Codes Detection Based on Ensemble Learning -- Generating Simplified Regular Expression Signatures for Polymorphic Worms -- Secured Services and Applications -- AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks -- A Prediction-Based Fair Replication Algorithm in Structured P2P Systems -- TransCom: A Virtual Disk Based Self-management System -- Defending Against Jamming Attacks in Wireless Local Area Networks -- Fault-Tolerant Systems -- Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels -- A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection -- A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling -- An Enhanced DGIDE Platform for Intrusion Detection. 330 $aNo fewer than 55 revised full papers are presented in this volume, all given at the 4th International Conference on Autonomic and Trusted Computing, held in Hong Kong, China in July 2007. The papers, presented together with one keynote lecture, were carefully reviewed and selected from 223 submissions. The papers are organized in topical sections on, among others, cryptography and signatures, autonomic computing and services, and secure and trusted computing. 410 0$aProgramming and Software Engineering,$x2945-9168 ;$v4610 606 $aComputer science 606 $aData protection 606 $aSoftware engineering 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aApplication software 606 $aTheory of Computation 606 $aData and Information Security 606 $aSoftware Engineering 606 $aComputer Communication Networks 606 $aCryptology 606 $aComputer and Information Systems Applications 615 0$aComputer science. 615 0$aData protection. 615 0$aSoftware engineering. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 14$aTheory of Computation. 615 24$aData and Information Security. 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aComputer and Information Systems Applications. 676 $a005.8 702 $aXiao$b Bin$cDr, 712 12$aATC (Conference) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484701903321 996 $aAutonomic and Trusted Computing$9773129 997 $aUNINA