LEADER 05533nam 22008295 450 001 996465836903316 005 20220624005631.0 010 $a3-642-02704-0 024 7 $a10.1007/978-3-642-02704-8 035 $a(CKB)1000000000761219 035 $a(SSID)ssj0000316417 035 $a(PQKBManifestationID)11275356 035 $a(PQKBTitleCode)TC0000316417 035 $a(PQKBWorkID)10275510 035 $a(PQKB)10151754 035 $a(DE-He213)978-3-642-02704-8 035 $a(MiAaPQ)EBC3064362 035 $a(PPN)136307078 035 $a(EXLCZ)991000000000761219 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAutonomic and Trusted Computing$b[electronic resource] $e6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings /$fedited by Juan González Nieto, Guojun Wang, Wolfgang Reif, Jadwiga Indulska 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XII, 269 p.) 225 1 $aProgramming and Software Engineering ;$v5586 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-02703-2 320 $aIncludes bibliographical references and index. 327 $aKeynote Speech -- Design for Trust in Ambient and Ubiquitous Computing -- Organic and Autonomic Computing -- Towards an Organic Network Control System -- A Universal Self-Organization Mechanism for Role-Based Organic Computing Systems -- Towards Self-organization in Automotive Embedded Systems -- Analyzing the Behavior of an Artificial Hormone System for Task Allocation -- A Software Test Cases Automated Generation Algorithm Based on Immune Principles -- Management without (Detailed) Models -- Formal Development of Self-organising Systems -- Using Reinforcement Learning for Multi-policy Optimization in Decentralized Autonomic Systems ? An Experimental Evaluation -- Trusted Computing -- SAConf: Semantic Attestation of Software Configurations -- ALOPA: Authorization Logic for Property Attestation in Trusted Platforms -- Wireless Sensor Networks -- Employed BPN to Multi-sensors Data Fusion for Environment Monitoring Services -- Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks -- Trust -- A Methodology towards Usable Trust Management -- Formalizing Trust Based on Usage Behaviours for Mobile Applications -- Toward Trustworthy Semantic Web Service Discovery and Selection -- Fuzzy Regression Based Trust Prediction in Service-Oriented Applications -- Theories of Trust for Communication Protocols -- Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Autonomic and Trusted Computing, ATC 2009, held in Brisbane, Australia, in July 2009, co-located with UIC 2009, the 6th International Conference on Ubiquitous Intelligence and Computing. The 17 revised full papers presented together with one invited paper and one keynote talk were carefully reviewed and selected from 52 submissions. The regular papers are organized in topical sections on organic and autonomic computing, trusted computing, wireless sensor networks, and trust. 410 0$aProgramming and Software Engineering ;$v5586 606 $aComputer security 606 $aSoftware engineering 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aApplication software 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aSoftware engineering. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aGonzález Nieto$b Juan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Guojun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aReif$b Wolfgang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIndulska$b Jadwiga$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aATC 2009 906 $aBOOK 912 $a996465836903316 996 $aAutonomic and Trusted Computing$9773129 997 $aUNISA