Autonomic and Trusted Computing [[electronic resource] ] : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings / / edited by Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (XV, 666 p.) |
Disciplina | 005.8 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer security
Software engineering Computer communication systems Data encryption (Computer science) Application software Management information systems Computer science Systems and Data Security Software Engineering Computer Communication Networks Cryptology Information Systems Applications (incl. Internet) Management of Computing and Information Systems |
ISBN | 3-540-69295-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Speech -- Sensor Network Applications Implemented by Industry and Their Security Challenges -- Regular Papers -- Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching -- Preventing DDoS Attacks Based on Credit Model for P2P Streaming System -- Design, Prototype, and Evaluation of a Network Monitoring Library -- Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN -- A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments -- Using Automated Planning for Trusted Self-organising Organic Computing Systems -- A Trusted Group Signature Architecture in Virtual Computing Environment -- SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks -- Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes -- An Integrated Solution for Policy Filtering and Traffic Anomaly Detection -- Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations -- SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks -- Scheduling for Reliable Execution in Autonomic Systems -- Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation -- Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots -- Maximising Personal Utility Using Intelligent Strategy in Minority Game -- Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation -- Organic Control of Traffic Lights -- Concepts for Autonomous Control Flow Checking for Embedded CPUs -- Autonomous Querying for Knowledge Networks -- Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database -- Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network -- Self-reconfiguration in Highly Available Pervasive Computing Systems -- Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose -- An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL -- Special Session Papers -- Distributed Performance Control in Organic Embedded Systems -- An Operating System Architecture for Organic Computing in Embedded Real-Time Systems -- Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks -- Embedding Dynamic Behaviour into a Self-configuring Software System -- Service Discovery of IP Cameras Using SIP and Zeroconf Protocols -- Adaptability of the TRSIM Model to Some Changes in Agents Behaviour -- Trusting Groups in Coalition Formation Using Social Distance -- Adjustable Trust Model for Access Control -- Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering -- A User Behavior Based Trust Model for Mobile Applications -- Managing Contracts in Pleiades Using Trust Management -- A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family -- Annotation Markers for Runtime Replication Protocol Selection -- Enhanced Three-Round Smart Card-Based Key Exchange Protocol -- Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments -- A Study of Information Security Practice in a Critical Infrastructure Application -- Web Search Results Clustering Based on a Novel Suffix Tree Structure -- Di-GAFR: Directed Greedy Adaptive Face-Based Routing -- Cooperative Management Framework for Inter-domain Routing System -- Performance Problem Determination Using Combined Dependency Analysis for Reliable System -- A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards -- Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes -- Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems -- A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter -- Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server -- A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks. |
Record Nr. | UNISA-996465299203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Autonomic and trusted computing : 5th international conference, ATC 2008, Oslo, Norway, June 23-25, 2008 : proceedings / / Chunming Rong ... [et al.] (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, : Springer, 2008 |
Descrizione fisica | 1 online resource (XV, 666 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | RongChunming |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 2, Programming and software engineering |
Soggetto topico |
Autonomic computing
Computer security Computer networks - Security measures |
ISBN | 3-540-69295-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Speech -- Sensor Network Applications Implemented by Industry and Their Security Challenges -- Regular Papers -- Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching -- Preventing DDoS Attacks Based on Credit Model for P2P Streaming System -- Design, Prototype, and Evaluation of a Network Monitoring Library -- Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN -- A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments -- Using Automated Planning for Trusted Self-organising Organic Computing Systems -- A Trusted Group Signature Architecture in Virtual Computing Environment -- SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks -- Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes -- An Integrated Solution for Policy Filtering and Traffic Anomaly Detection -- Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations -- SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks -- Scheduling for Reliable Execution in Autonomic Systems -- Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation -- Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots -- Maximising Personal Utility Using Intelligent Strategy in Minority Game -- Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation -- Organic Control of Traffic Lights -- Concepts for Autonomous Control Flow Checking for Embedded CPUs -- Autonomous Querying for Knowledge Networks -- Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database -- Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network -- Self-reconfiguration in Highly Available Pervasive Computing Systems -- Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose -- An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL -- Special Session Papers -- Distributed Performance Control in Organic Embedded Systems -- An Operating System Architecture for Organic Computing in Embedded Real-Time Systems -- Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks -- Embedding Dynamic Behaviour into a Self-configuring Software System -- Service Discovery of IP Cameras Using SIP and Zeroconf Protocols -- Adaptability of the TRSIM Model to Some Changes in Agents Behaviour -- Trusting Groups in Coalition Formation Using Social Distance -- Adjustable Trust Model for Access Control -- Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering -- A User Behavior Based Trust Model for Mobile Applications -- Managing Contracts in Pleiades Using Trust Management -- A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family -- Annotation Markers for Runtime Replication Protocol Selection -- Enhanced Three-Round Smart Card-Based Key Exchange Protocol -- Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments -- A Study of Information Security Practice in a Critical Infrastructure Application -- Web Search Results Clustering Based on a Novel Suffix Tree Structure -- Di-GAFR: Directed Greedy Adaptive Face-Based Routing -- Cooperative Management Framework for Inter-domain Routing System -- Performance Problem Determination Using Combined Dependency Analysis for Reliable System -- A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards -- Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes -- Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems -- A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter -- Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server -- A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks. |
Altri titoli varianti | ATC 2008 |
Record Nr. | UNINA-9910483957603321 |
Berlin, : Springer, 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cloud Computing [[electronic resource] ] : First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings / / edited by Martin Gilje Jaatun, Gansen Zhao, Chunming Rong |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XX, 707 p.) |
Disciplina | 004.67/82 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Computer organization Computer system failures Computer software—Reusability Architecture, Computer Software engineering Computer Communication Networks Computer Systems Organization and Communication Networks System Performance and Evaluation Performance and Reliability Computer System Implementation Software Engineering/Programming and Operating Systems |
Soggetto genere / forma |
Kongress.
Online-Publikation Peking (2009) |
ISBN | 3-642-10665-X |
Classificazione |
DAT 060f
DAT 250f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Papers -- The Many Colors and Shapes of Cloud -- Biomedical Case Studies in Data Intensive Computing -- An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf -- Cloudbus Toolkit for Market-Oriented Cloud Computing -- Full Papers -- Self-healing and Hybrid Diagnosis in Cloud Computing -- Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges -- Trust Model to Enhance Security and Interoperability of Cloud Environment -- Dynamic Malicious Code Detection Based on Binary Translator -- A Privacy Manager for Cloud Computing -- Privacy in a Semantic Cloud: What’s Trust Got to Do with It? -- Data Protection-Aware Design for Cloud Services -- Accountability as a Way Forward for Privacy Protection in the Cloud -- Towards an Approach of Semantic Access Control for Cloud Computing -- Identity-Based Authentication for Cloud Computing -- Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography -- Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes -- Data Center Consolidation: A Step towards Infrastructure Clouds -- Decentralized Service Allocation in a Broker Overlay Based Grid -- DisTec: Towards a Distributed System for Telecom Computing -- Cloud Computing Boosts Business Intelligence of Telecommunication Industry -- Composable IO: A Novel Resource Sharing Platform in Personal Clouds -- SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud -- Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation -- Cloud-Oriented Virtual Machine Management with MLN -- A Systematic Process for Developing High Quality SaaS Cloud Services -- Cloud Computing Service Composition and Search Based on Semantic -- Deploying Mobile Computation in Cloud Service -- A Novel Method for Mining SaaS Software Tag via Community Detection in Software Services Network -- Retrieving and Indexing Spatial Data in the Cloud Computing Environment -- Search Engine Prototype System Based on Cloud Computing -- Distributed Structured Database System HugeTable -- Cloud Computing: A Statistics Aspect of Users -- An Efficient Cloud Computing-Based Architecture for Freight System Application in China Railway -- Web Server Farm in the Cloud: Performance Evaluation and Dynamic Architecture -- SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres -- CloudWF: A Computational Workflow System for Clouds Based on Hadoop -- A Novel Multipath Load Balancing Algorithm in Fat-Tree Data Center -- Scheduling Active Services in Clustered JBI Environment -- Task Parallel Scheduling over Multi-core System -- Cost-Minimizing Scheduling of Workflows on a Cloud of Memory Managed Multicore Machines -- Green Cloud on the Horizon -- Industrial Cloud: Toward Inter-enterprise Integration -- Community Cloud Computing -- A Semantic Grid Oriented to E-Tourism -- Irregular Community Discovery for Social CRM in Cloud Computing -- A Contextual Information Acquisition Approach Based on Semantics and Mashup Technology -- Evaluating MapReduce on Virtual Machines: The Hadoop Case -- APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing -- Short Papers -- Secure Document Service for Cloud Computing -- Privacy of Value-Added Context-Aware Service Cloud -- A Simple Technique for Securing Data at Rest Stored in a Computing Cloud -- Access Control of Cloud Service Based on UCON -- Replica Replacement Strategy Evaluation Based on Grid Locality -- Performance Evaluation of Cloud Service Considering Fault Recovery -- BlueSky Cloud Framework: An E-Learning Framework Embracing Cloud Computing -- Cloud Infrastructure & Applications – CloudIA -- One Program Model for Cloud Computing -- Enterprise Cloud Architecture for Chinese Ministry of Railway -- Research on Cloud Computing Based on Deep Analysis to Typical Platforms -- Automatic Construction of SP Problem-Solving Resource Space -- An Idea of Special Cloud Computing in Forest Pests’ Control -- IBM Cloud Computing Powering a Smarter Planet -- Cloud Computing: An Overview -- Integrating Cloud-Computing-Specific Model into Aircraft Design -- Towards a Theory of Universally Composable Cloud Computing -- A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture -- Price-Oriented Trading Optimization for Grid Resource -- A Requirements Recommendation Method Based on Service Description -- Extending YML to Be a Middleware for Scientific Cloud Computing -- Power-Aware Management in Cloud Data Centers -- Parallel K-Means Clustering Based on MapReduce -- Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce -- Distributed Scheduling Extension on Hadoop -- A Data Distribution Aware Task Scheduling Strategy for MapReduce System -- Cloud Computing Based Internet Data Center. |
Record Nr. | UNISA-996465582703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cloud computing : first International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, proceedings / / Martin Gilje Jaatun, Gansen Zhao, Chunming Rong (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, : Springer, 2009 |
Descrizione fisica | 1 online resource (XX, 707 p.) |
Disciplina | 004.67/82 |
Altri autori (Persone) |
JaatunMartin Gilje
ZhaoGansen RongChunming |
Collana | Lecture notes in computer science |
Soggetto topico |
Cloud computing
Computer science |
ISBN | 3-642-10665-X |
Classificazione |
DAT 060f
DAT 250f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Papers -- The Many Colors and Shapes of Cloud -- Biomedical Case Studies in Data Intensive Computing -- An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf -- Cloudbus Toolkit for Market-Oriented Cloud Computing -- Full Papers -- Self-healing and Hybrid Diagnosis in Cloud Computing -- Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges -- Trust Model to Enhance Security and Interoperability of Cloud Environment -- Dynamic Malicious Code Detection Based on Binary Translator -- A Privacy Manager for Cloud Computing -- Privacy in a Semantic Cloud: What’s Trust Got to Do with It? -- Data Protection-Aware Design for Cloud Services -- Accountability as a Way Forward for Privacy Protection in the Cloud -- Towards an Approach of Semantic Access Control for Cloud Computing -- Identity-Based Authentication for Cloud Computing -- Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography -- Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes -- Data Center Consolidation: A Step towards Infrastructure Clouds -- Decentralized Service Allocation in a Broker Overlay Based Grid -- DisTec: Towards a Distributed System for Telecom Computing -- Cloud Computing Boosts Business Intelligence of Telecommunication Industry -- Composable IO: A Novel Resource Sharing Platform in Personal Clouds -- SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud -- Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation -- Cloud-Oriented Virtual Machine Management with MLN -- A Systematic Process for Developing High Quality SaaS Cloud Services -- Cloud Computing Service Composition and Search Based on Semantic -- Deploying Mobile Computation in Cloud Service -- A Novel Method for Mining SaaS Software Tag via Community Detection in Software Services Network -- Retrieving and Indexing Spatial Data in the Cloud Computing Environment -- Search Engine Prototype System Based on Cloud Computing -- Distributed Structured Database System HugeTable -- Cloud Computing: A Statistics Aspect of Users -- An Efficient Cloud Computing-Based Architecture for Freight System Application in China Railway -- Web Server Farm in the Cloud: Performance Evaluation and Dynamic Architecture -- SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres -- CloudWF: A Computational Workflow System for Clouds Based on Hadoop -- A Novel Multipath Load Balancing Algorithm in Fat-Tree Data Center -- Scheduling Active Services in Clustered JBI Environment -- Task Parallel Scheduling over Multi-core System -- Cost-Minimizing Scheduling of Workflows on a Cloud of Memory Managed Multicore Machines -- Green Cloud on the Horizon -- Industrial Cloud: Toward Inter-enterprise Integration -- Community Cloud Computing -- A Semantic Grid Oriented to E-Tourism -- Irregular Community Discovery for Social CRM in Cloud Computing -- A Contextual Information Acquisition Approach Based on Semantics and Mashup Technology -- Evaluating MapReduce on Virtual Machines: The Hadoop Case -- APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing -- Short Papers -- Secure Document Service for Cloud Computing -- Privacy of Value-Added Context-Aware Service Cloud -- A Simple Technique for Securing Data at Rest Stored in a Computing Cloud -- Access Control of Cloud Service Based on UCON -- Replica Replacement Strategy Evaluation Based on Grid Locality -- Performance Evaluation of Cloud Service Considering Fault Recovery -- BlueSky Cloud Framework: An E-Learning Framework Embracing Cloud Computing -- Cloud Infrastructure & Applications – CloudIA -- One Program Model for Cloud Computing -- Enterprise Cloud Architecture for Chinese Ministry of Railway -- Research on Cloud Computing Based on Deep Analysis to Typical Platforms -- Automatic Construction of SP Problem-Solving Resource Space -- An Idea of Special Cloud Computing in Forest Pests’ Control -- IBM Cloud Computing Powering a Smarter Planet -- Cloud Computing: An Overview -- Integrating Cloud-Computing-Specific Model into Aircraft Design -- Towards a Theory of Universally Composable Cloud Computing -- A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture -- Price-Oriented Trading Optimization for Grid Resource -- A Requirements Recommendation Method Based on Service Description -- Extending YML to Be a Middleware for Scientific Cloud Computing -- Power-Aware Management in Cloud Data Centers -- Parallel K-Means Clustering Based on MapReduce -- Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce -- Distributed Scheduling Extension on Hadoop -- A Data Distribution Aware Task Scheduling Strategy for MapReduce System -- Cloud Computing Based Internet Data Center. |
Altri titoli varianti | CloudCom 2009 |
Record Nr. | UNINA-9910483687203321 |
Berlin, : Springer, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cloud Computing and Big Data: Technologies, Applications and Security / / edited by Mostapha Zbakh, Mohammed Essaaidi, Pierre Manneback, Chunming Rong |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 394 p. 126 illus.) |
Disciplina | 629.8 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Mechatronics
Computational intelligence Computational Intelligence |
ISBN | 3-319-97719-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Elliptic Curve Qu-Vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage -- Cloud Computing: Overview and Risk Identification Based on Classification by Type -- Authentication Model for Mobile Cloud Computing Database Service -- FADETPM: Novel Approach of File Assured Deletion Based on Trusted Platform Module -- Issues and Threats of Cloud Data Storage -- Challenges of Crowd Sensing for Cost-effective Data Management in the Cloud -- On the Security of Medical Image Processing in Cloud Environment -- Implementations of Intrusion Detection Architectures in Cloud Computing -- Privacy in Big Data Through Variable t-Closeness for MSN Attributes -- The Big Data-RTAP: Toward a Secured Video Surveillance System in Smart Environment -- Optimizations in Fully Homomorphic Encryption -- Support Cloud SLA establishment using MDE -- A New Parallel and Distributed Approach for Large Scale Images Retrieval -- Classification of Social Network Data Using a Dictionary-Based Approach -- Parallel and Distributed Map-Reduce Models for External Clustering Validation Indexes -- Workflow Scheduling Issues and Techniques in Cloud Computing: A Systematic Literature Review -- A Review of Green Cloud Computing Techniques -- Towards a smart exploitation of GPUs for low energy motion estimation using Full HD and 4K Videos -- Machine Learning applications in supply chains: Long Short-Term Memory for demand forecasting -- Performance Analysis of Preconditioned Conjugate Gradient Solver on Heterogeneous (Multi-CPUs/Multi-GPUs) Architecture -- Runtime prediction of optimizers using improved support vector machine -- AND/OR directed graph for dynamic web service composition -- An NLP based text-to-speech synthesizer for Moroccan Arabic -- Context-Aware Routing Protocol for Mobile WSN : Fire Forest Detection. . |
Record Nr. | UNINA-9910483178703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong |
Autore | #Cayirci E. (Erdal) |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chichester, U.K. : , : Wiley, , c2009 |
Descrizione fisica | 1 online resource (283 p.) |
Disciplina |
005.8
621.384 |
Altri autori (Persone) | RongChunming |
Soggetto topico |
Ad hoc networks (Computer networks) - Security measures
Computer networks - Security measures |
ISBN |
1-282-68998-3
9786612689987 0-470-51678-X 0-470-51677-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.2 Sensor and Actuator Networks -- 2.3 Mesh Networks. / -- 2.4 Tactical Communications and Networks -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- .6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.2 Advanced Radio Technologies -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.2 Error Control -- 4.3 Wireless Metropolitan Area Networks -- 4.4 Wireless Local Area Networks -- 4.5 Wireless Personal Area Networks. / -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other Challenges and Security Aspects -- 7.1 Localization and Positioning -- 7.2 Time Synchronization -- 7.3 Addressing -- 7.4 Data Aggregation and Fusion -- 7.5 Data Querying -- 7.6 Coverage -- 7.7 Mobility Management -- 7.8 Cross-layer Design -- 7.9 Review Questions -- Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking -- 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks -- 8.1 Security Attacks -- 8.2 Attackers -- 8.3 Security Goals -- 8.4 Review Questions -- 9 Cryptography -- 9.1 Symmetric Encryption -- 9.2 Asymmetric Encryption -- 9.3 Hash Functions and Message Authentication Code -- 9.4 Cascading Hashing -- 9.5 Review Questions -- 10 Challenges and Solutions: Basic Issues -- 10.1 Bootstrapping Security in Ad Hoc Networks.
10.2 Bootstrapping Security in Sensor Networks -- 10.3 Key Distribution, Exchange and Management -- 10.4 Authentication Issues -- 10.5 Integrity -- 10.6 Review Questions -- 11 Challenges and Solutions: Protection -- 11.1 Privacy and Anonymity -- 11.2 Intrusion Detection -- 11.3 Defense Against Traffic Analysis -- 11.4 Access Control and Secure Human / Computer Interaction -- 11.5 Software-Based Anti-Tamper Techniques -- 11.6 Tamper Resilience: Hardware Protection -- 11.7 Availability and Plausibility -- 11.8 Review Questions -- 12 Secure Routing -- 12.1 Defense Against Security Attacks in Ad Hoc Routing -- 12.2 Secure Ad Hoc Routing Protocols -- 12.3 Further Reading -- 12.4 Review Questions -- 13 Specific Challenges and Solutions -- 13.1 SPINS: Security Protocols for Sensor Networks -- 13.2 Quarantine Region Scheme for Spam Attacks -- 13.3 Secure Charging and Rewarding Scheme -- 13.4 Secure Node Localization -- 13.5 Secure Time Synchronization -- 13.6 Secure Event and Event Boundary Detection -- 13.7 Review Questions -- 14 Information Operations and Electronic Warfare -- 14.1 Electronic Support -- 14.2 Electronic Attack -- 14.3 Electronic Protection -- 14.4 Review Questions -- 15 Standards -- 15.1 X.800 and RFC 2828 -- 15.2 Wired Equivalent Privacy (WEP) -- 15.3 Wi-Fi Protected Access (WPA) -- References -- Index. |
Record Nr. | UNINA-9910145261303321 |
#Cayirci E. (Erdal) | ||
Chichester, U.K. : , : Wiley, , c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong |
Autore | #Cayirci E. (Erdal) |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chichester, U.K. : , : Wiley, , c2009 |
Descrizione fisica | 1 online resource (283 p.) |
Disciplina |
005.8
621.384 |
Altri autori (Persone) | RongChunming |
Soggetto topico |
Ad hoc networks (Computer networks) - Security measures
Computer networks - Security measures |
ISBN |
1-282-68998-3
9786612689987 0-470-51678-X 0-470-51677-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.2 Sensor and Actuator Networks -- 2.3 Mesh Networks. / -- 2.4 Tactical Communications and Networks -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- .6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.2 Advanced Radio Technologies -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.2 Error Control -- 4.3 Wireless Metropolitan Area Networks -- 4.4 Wireless Local Area Networks -- 4.5 Wireless Personal Area Networks. / -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other Challenges and Security Aspects -- 7.1 Localization and Positioning -- 7.2 Time Synchronization -- 7.3 Addressing -- 7.4 Data Aggregation and Fusion -- 7.5 Data Querying -- 7.6 Coverage -- 7.7 Mobility Management -- 7.8 Cross-layer Design -- 7.9 Review Questions -- Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking -- 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks -- 8.1 Security Attacks -- 8.2 Attackers -- 8.3 Security Goals -- 8.4 Review Questions -- 9 Cryptography -- 9.1 Symmetric Encryption -- 9.2 Asymmetric Encryption -- 9.3 Hash Functions and Message Authentication Code -- 9.4 Cascading Hashing -- 9.5 Review Questions -- 10 Challenges and Solutions: Basic Issues -- 10.1 Bootstrapping Security in Ad Hoc Networks.
10.2 Bootstrapping Security in Sensor Networks -- 10.3 Key Distribution, Exchange and Management -- 10.4 Authentication Issues -- 10.5 Integrity -- 10.6 Review Questions -- 11 Challenges and Solutions: Protection -- 11.1 Privacy and Anonymity -- 11.2 Intrusion Detection -- 11.3 Defense Against Traffic Analysis -- 11.4 Access Control and Secure Human / Computer Interaction -- 11.5 Software-Based Anti-Tamper Techniques -- 11.6 Tamper Resilience: Hardware Protection -- 11.7 Availability and Plausibility -- 11.8 Review Questions -- 12 Secure Routing -- 12.1 Defense Against Security Attacks in Ad Hoc Routing -- 12.2 Secure Ad Hoc Routing Protocols -- 12.3 Further Reading -- 12.4 Review Questions -- 13 Specific Challenges and Solutions -- 13.1 SPINS: Security Protocols for Sensor Networks -- 13.2 Quarantine Region Scheme for Spam Attacks -- 13.3 Secure Charging and Rewarding Scheme -- 13.4 Secure Node Localization -- 13.5 Secure Time Synchronization -- 13.6 Secure Event and Event Boundary Detection -- 13.7 Review Questions -- 14 Information Operations and Electronic Warfare -- 14.1 Electronic Support -- 14.2 Electronic Attack -- 14.3 Electronic Protection -- 14.4 Review Questions -- 15 Standards -- 15.1 X.800 and RFC 2828 -- 15.2 Wired Equivalent Privacy (WEP) -- 15.3 Wi-Fi Protected Access (WPA) -- References -- Index. |
Record Nr. | UNINA-9910830815703321 |
#Cayirci E. (Erdal) | ||
Chichester, U.K. : , : Wiley, , c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in wireless ad hoc and sensor networks / / Erdal Cayrc, Chunming Rong |
Autore | Cayirci E (Erdal) |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chichester, U.K., : Wiley, 2009 |
Descrizione fisica | 1 online resource (283 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | RongChunming |
Soggetto topico |
Ad hoc networks (Computer networks) - Security measures
Computer networks - Security measures |
ISBN |
9786612689987
9781282689985 1282689983 9780470516782 047051678X 9780470516775 0470516771 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.2 Sensor and Actuator Networks -- 2.3 Mesh Networks. / -- 2.4 Tactical Communications and Networks -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- .6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.2 Advanced Radio Technologies -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.2 Error Control -- 4.3 Wireless Metropolitan Area Networks -- 4.4 Wireless Local Area Networks -- 4.5 Wireless Personal Area Networks. / -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other Challenges and Security Aspects -- 7.1 Localization and Positioning -- 7.2 Time Synchronization -- 7.3 Addressing -- 7.4 Data Aggregation and Fusion -- 7.5 Data Querying -- 7.6 Coverage -- 7.7 Mobility Management -- 7.8 Cross-layer Design -- 7.9 Review Questions -- Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking -- 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks -- 8.1 Security Attacks -- 8.2 Attackers -- 8.3 Security Goals -- 8.4 Review Questions -- 9 Cryptography -- 9.1 Symmetric Encryption -- 9.2 Asymmetric Encryption -- 9.3 Hash Functions and Message Authentication Code -- 9.4 Cascading Hashing -- 9.5 Review Questions -- 10 Challenges and Solutions: Basic Issues -- 10.1 Bootstrapping Security in Ad Hoc Networks.
10.2 Bootstrapping Security in Sensor Networks -- 10.3 Key Distribution, Exchange and Management -- 10.4 Authentication Issues -- 10.5 Integrity -- 10.6 Review Questions -- 11 Challenges and Solutions: Protection -- 11.1 Privacy and Anonymity -- 11.2 Intrusion Detection -- 11.3 Defense Against Traffic Analysis -- 11.4 Access Control and Secure Human / Computer Interaction -- 11.5 Software-Based Anti-Tamper Techniques -- 11.6 Tamper Resilience: Hardware Protection -- 11.7 Availability and Plausibility -- 11.8 Review Questions -- 12 Secure Routing -- 12.1 Defense Against Security Attacks in Ad Hoc Routing -- 12.2 Secure Ad Hoc Routing Protocols -- 12.3 Further Reading -- 12.4 Review Questions -- 13 Specific Challenges and Solutions -- 13.1 SPINS: Security Protocols for Sensor Networks -- 13.2 Quarantine Region Scheme for Spam Attacks -- 13.3 Secure Charging and Rewarding Scheme -- 13.4 Secure Node Localization -- 13.5 Secure Time Synchronization -- 13.6 Secure Event and Event Boundary Detection -- 13.7 Review Questions -- 14 Information Operations and Electronic Warfare -- 14.1 Electronic Support -- 14.2 Electronic Attack -- 14.3 Electronic Protection -- 14.4 Review Questions -- 15 Standards -- 15.1 X.800 and RFC 2828 -- 15.2 Wired Equivalent Privacy (WEP) -- 15.3 Wi-Fi Protected Access (WPA) -- References -- Index. |
Record Nr. | UNINA-9910877830903321 |
Cayirci E (Erdal) | ||
Chichester, U.K., : Wiley, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Ubiquitous Intelligence and Computing [[electronic resource] ] : 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings / / edited by Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence Tianruo Yang |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (XVIII, 763 p.) |
Disciplina |
005.437
4.019 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
User interfaces (Computer systems)
Application software Computer communication systems Computer security Artificial intelligence Computers and civilization User Interfaces and Human Computer Interaction Information Systems Applications (incl. Internet) Computer Communication Networks Systems and Data Security Artificial Intelligence Computers and Society |
ISBN | 3-540-69293-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Speech -- Challenges in the Design and Development of Context-Aware Applications -- The Importance of Including the Haptics Factor in Interaction Design -- Regular Papers -- Security Policy Integration and Conflict Reconciliation for Collaborations among Organizations in Ubiquitous Computing Environments -- Improved Weighted Centroid Localization in Smart Ubiquitous Environments -- A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment -- Pervasive Services on the Move: Smart Service Diffusion on the OSGi Framework -- Robots in Smart Spaces - A Case Study of a u-Object Finder Prototype - -- Biometrics Driven Smart Environments: Abstract Framework and Evaluation -- A Structured Methodology of Scenario Generation and System Analysis for Ubiquitous Smart Space Development -- Capturing Semantics for Information Security and Privacy Assurance -- A Framework for Context-Aware Home-Health Monitoring -- Semantic Learning Space: An Infrastructure for Context-Aware Ubiquitous Learning -- A Comprehensive Approach for Situation-Awareness Based on Sensing and Reasoning about Context -- Context-Adaptive User Interface in Ubiquitous Home Generated by Bayesian and Action Selection Networks -- Use Semantic Decision Tables to Improve Meaning Evolution Support Systems -- Combining User Profiles and Situation Contexts for Spontaneous Service Provision in Smart Assistive Environments -- Ubiquitous Phone System -- Utilizing RFIDs for Location Aware Computing -- A Component-Based Ambient Agent Model for Assessment of Driving Behaviour -- A Cartesian Robot for RFID Signal Distribution Model Verification -- Self-Localization in a Low Cost Bluetooth Environment -- Penetration Testing of OPC as Part of Process Control Systems -- Intersection Location Service for Vehicular Ad Hoc Networks with Cars in Manhattan Style Movement Patterns -- Ubiquitous and Robust Text-Independent Speaker Recognition for Home Automation Digital Life -- Energy Efficient In-Network Phase RFID Data Filtering Scheme -- Energy-Efficient Tracking of Continuous Objects in Wireless Sensor Networks -- Data Randomization for Lightweight Secure Data Aggregation in Sensor Network -- Mobile Sink Routing Protocol with Registering in Cluster-Based Wireless Sensor Networks -- Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks -- An Energy-Efficient Query Processing Algorithm for Wireless Sensor Networks -- Special Session Papers -- Rule Selection for Collaborative Ubiquitous Smart Device Development: Rough Set Based Approach -- An Object-Oriented Framework for Common Abstraction and the Comet-Based Interaction of Physical u-Objects and Digital Services -- Personalizing Threshold Values on Behavior Detection with Collaborative Filtering -- IP Traceback Using Digital Watermark and Honeypot -- Multi-priority Multi-path Selection for Video Streaming in Wireless Multimedia Sensor Networks -- Energy Constrained Multipath Routing in Wireless Sensor Networks -- Controlling Uncertainty in Personal Positioning at Minimal Measurement Cost -- RFID System Security Using Identity-Based Cryptography -- RFID: An Ideal Technology for Ubiquitous Computing? -- An Experimental Analysis of Undo in Ubiquitous Computing Environments -- Towards a Collaborative Reputation Based Service Provider Selection in Ubiquitous Computing Environments -- Petri Net-Based Episode Detection and Story Generation from Ubiquitous Life Log -- Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network -- Universal Remote Control for the Smart World -- Mobile Navigation System for the Elderly – Preliminary Experiment and Evaluation -- Time Stamp Protocol for Smart Environment Services -- An Analysis of the Manufacturing Messaging Specification Protocol -- A Long-Distance Time Domain Sound Localization -- Towards Dataintegration from WITSML to ISO 15926 -- A SIP-Based Session Mobility Management Framework for Ubiquitous Multimedia Services -- AwarePen - Classification Probability and Fuzziness in a Context Aware Application -- A Model Driven Development Method for Developing Context-Aware Pervasive Systems -- Intelligent System Architecture for Context-Awareness in Ubiquitous Computing -- User-Based Constraint Strategy in Ontology Matching -- RFID-Based Interactive Learning in Science Museums -- Real-Time Detection of Passing Objects Using Virtual Gate and Motion Vector Analysis -- A Ubiquitous Interactive Museum Guide -- Dynamic Probabilistic Packet Marking with Partial Non-Preemption -- Fractal Model Based Face Recognition for Ubiquitous Environments. |
Record Nr. | UNISA-996465302103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|