top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Autonomic and Trusted Computing [[electronic resource] ] : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings / / edited by Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang
Autonomic and Trusted Computing [[electronic resource] ] : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings / / edited by Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XV, 666 p.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer security
Software engineering
Computer communication systems
Data encryption (Computer science)
Application software
Management information systems
Computer science
Systems and Data Security
Software Engineering
Computer Communication Networks
Cryptology
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
ISBN 3-540-69295-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Sensor Network Applications Implemented by Industry and Their Security Challenges -- Regular Papers -- Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching -- Preventing DDoS Attacks Based on Credit Model for P2P Streaming System -- Design, Prototype, and Evaluation of a Network Monitoring Library -- Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN -- A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments -- Using Automated Planning for Trusted Self-organising Organic Computing Systems -- A Trusted Group Signature Architecture in Virtual Computing Environment -- SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks -- Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes -- An Integrated Solution for Policy Filtering and Traffic Anomaly Detection -- Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations -- SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks -- Scheduling for Reliable Execution in Autonomic Systems -- Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation -- Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots -- Maximising Personal Utility Using Intelligent Strategy in Minority Game -- Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation -- Organic Control of Traffic Lights -- Concepts for Autonomous Control Flow Checking for Embedded CPUs -- Autonomous Querying for Knowledge Networks -- Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database -- Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network -- Self-reconfiguration in Highly Available Pervasive Computing Systems -- Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose -- An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL -- Special Session Papers -- Distributed Performance Control in Organic Embedded Systems -- An Operating System Architecture for Organic Computing in Embedded Real-Time Systems -- Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks -- Embedding Dynamic Behaviour into a Self-configuring Software System -- Service Discovery of IP Cameras Using SIP and Zeroconf Protocols -- Adaptability of the TRSIM Model to Some Changes in Agents Behaviour -- Trusting Groups in Coalition Formation Using Social Distance -- Adjustable Trust Model for Access Control -- Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering -- A User Behavior Based Trust Model for Mobile Applications -- Managing Contracts in Pleiades Using Trust Management -- A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family -- Annotation Markers for Runtime Replication Protocol Selection -- Enhanced Three-Round Smart Card-Based Key Exchange Protocol -- Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments -- A Study of Information Security Practice in a Critical Infrastructure Application -- Web Search Results Clustering Based on a Novel Suffix Tree Structure -- Di-GAFR: Directed Greedy Adaptive Face-Based Routing -- Cooperative Management Framework for Inter-domain Routing System -- Performance Problem Determination Using Combined Dependency Analysis for Reliable System -- A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards -- Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes -- Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems -- A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter -- Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server -- A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks.
Record Nr. UNISA-996465299203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Autonomic and Trusted Computing : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings / / edited by Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang
Autonomic and Trusted Computing : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings / / edited by Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XV, 666 p.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer security
Software engineering
Computer communication systems
Data encryption (Computer science)
Application software
Management information systems
Computer science
Systems and Data Security
Software Engineering
Computer Communication Networks
Cryptology
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
ISBN 3-540-69295-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Sensor Network Applications Implemented by Industry and Their Security Challenges -- Regular Papers -- Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching -- Preventing DDoS Attacks Based on Credit Model for P2P Streaming System -- Design, Prototype, and Evaluation of a Network Monitoring Library -- Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN -- A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments -- Using Automated Planning for Trusted Self-organising Organic Computing Systems -- A Trusted Group Signature Architecture in Virtual Computing Environment -- SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks -- Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes -- An Integrated Solution for Policy Filtering and Traffic Anomaly Detection -- Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations -- SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks -- Scheduling for Reliable Execution in Autonomic Systems -- Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation -- Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots -- Maximising Personal Utility Using Intelligent Strategy in Minority Game -- Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation -- Organic Control of Traffic Lights -- Concepts for Autonomous Control Flow Checking for Embedded CPUs -- Autonomous Querying for Knowledge Networks -- Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database -- Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network -- Self-reconfiguration in Highly Available Pervasive Computing Systems -- Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose -- An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL -- Special Session Papers -- Distributed Performance Control in Organic Embedded Systems -- An Operating System Architecture for Organic Computing in Embedded Real-Time Systems -- Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks -- Embedding Dynamic Behaviour into a Self-configuring Software System -- Service Discovery of IP Cameras Using SIP and Zeroconf Protocols -- Adaptability of the TRSIM Model to Some Changes in Agents Behaviour -- Trusting Groups in Coalition Formation Using Social Distance -- Adjustable Trust Model for Access Control -- Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering -- A User Behavior Based Trust Model for Mobile Applications -- Managing Contracts in Pleiades Using Trust Management -- A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family -- Annotation Markers for Runtime Replication Protocol Selection -- Enhanced Three-Round Smart Card-Based Key Exchange Protocol -- Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments -- A Study of Information Security Practice in a Critical Infrastructure Application -- Web Search Results Clustering Based on a Novel Suffix Tree Structure -- Di-GAFR: Directed Greedy Adaptive Face-Based Routing -- Cooperative Management Framework for Inter-domain Routing System -- Performance Problem Determination Using Combined Dependency Analysis for Reliable System -- A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards -- Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes -- Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems -- A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter -- Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server -- A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks.
Record Nr. UNINA-9910483957603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cloud Computing [[electronic resource] ] : First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings / / edited by Martin Gilje Jaatun, Gansen Zhao, Chunming Rong
Cloud Computing [[electronic resource] ] : First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings / / edited by Martin Gilje Jaatun, Gansen Zhao, Chunming Rong
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XX, 707 p.)
Disciplina 004.67/82
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Computer organization
Computer system failures
Computer software—Reusability
Architecture, Computer
Software engineering
Computer Communication Networks
Computer Systems Organization and Communication Networks
System Performance and Evaluation
Performance and Reliability
Computer System Implementation
Software Engineering/Programming and Operating Systems
Soggetto genere / forma Kongress.
Online-Publikation
Peking (2009)
ISBN 3-642-10665-X
Classificazione DAT 060f
DAT 250f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- The Many Colors and Shapes of Cloud -- Biomedical Case Studies in Data Intensive Computing -- An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf -- Cloudbus Toolkit for Market-Oriented Cloud Computing -- Full Papers -- Self-healing and Hybrid Diagnosis in Cloud Computing -- Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges -- Trust Model to Enhance Security and Interoperability of Cloud Environment -- Dynamic Malicious Code Detection Based on Binary Translator -- A Privacy Manager for Cloud Computing -- Privacy in a Semantic Cloud: What’s Trust Got to Do with It? -- Data Protection-Aware Design for Cloud Services -- Accountability as a Way Forward for Privacy Protection in the Cloud -- Towards an Approach of Semantic Access Control for Cloud Computing -- Identity-Based Authentication for Cloud Computing -- Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography -- Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes -- Data Center Consolidation: A Step towards Infrastructure Clouds -- Decentralized Service Allocation in a Broker Overlay Based Grid -- DisTec: Towards a Distributed System for Telecom Computing -- Cloud Computing Boosts Business Intelligence of Telecommunication Industry -- Composable IO: A Novel Resource Sharing Platform in Personal Clouds -- SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud -- Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation -- Cloud-Oriented Virtual Machine Management with MLN -- A Systematic Process for Developing High Quality SaaS Cloud Services -- Cloud Computing Service Composition and Search Based on Semantic -- Deploying Mobile Computation in Cloud Service -- A Novel Method for Mining SaaS Software Tag via Community Detection in Software Services Network -- Retrieving and Indexing Spatial Data in the Cloud Computing Environment -- Search Engine Prototype System Based on Cloud Computing -- Distributed Structured Database System HugeTable -- Cloud Computing: A Statistics Aspect of Users -- An Efficient Cloud Computing-Based Architecture for Freight System Application in China Railway -- Web Server Farm in the Cloud: Performance Evaluation and Dynamic Architecture -- SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres -- CloudWF: A Computational Workflow System for Clouds Based on Hadoop -- A Novel Multipath Load Balancing Algorithm in Fat-Tree Data Center -- Scheduling Active Services in Clustered JBI Environment -- Task Parallel Scheduling over Multi-core System -- Cost-Minimizing Scheduling of Workflows on a Cloud of Memory Managed Multicore Machines -- Green Cloud on the Horizon -- Industrial Cloud: Toward Inter-enterprise Integration -- Community Cloud Computing -- A Semantic Grid Oriented to E-Tourism -- Irregular Community Discovery for Social CRM in Cloud Computing -- A Contextual Information Acquisition Approach Based on Semantics and Mashup Technology -- Evaluating MapReduce on Virtual Machines: The Hadoop Case -- APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing -- Short Papers -- Secure Document Service for Cloud Computing -- Privacy of Value-Added Context-Aware Service Cloud -- A Simple Technique for Securing Data at Rest Stored in a Computing Cloud -- Access Control of Cloud Service Based on UCON -- Replica Replacement Strategy Evaluation Based on Grid Locality -- Performance Evaluation of Cloud Service Considering Fault Recovery -- BlueSky Cloud Framework: An E-Learning Framework Embracing Cloud Computing -- Cloud Infrastructure & Applications – CloudIA -- One Program Model for Cloud Computing -- Enterprise Cloud Architecture for Chinese Ministry of Railway -- Research on Cloud Computing Based on Deep Analysis to Typical Platforms -- Automatic Construction of SP Problem-Solving Resource Space -- An Idea of Special Cloud Computing in Forest Pests’ Control -- IBM Cloud Computing Powering a Smarter Planet -- Cloud Computing: An Overview -- Integrating Cloud-Computing-Specific Model into Aircraft Design -- Towards a Theory of Universally Composable Cloud Computing -- A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture -- Price-Oriented Trading Optimization for Grid Resource -- A Requirements Recommendation Method Based on Service Description -- Extending YML to Be a Middleware for Scientific Cloud Computing -- Power-Aware Management in Cloud Data Centers -- Parallel K-Means Clustering Based on MapReduce -- Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce -- Distributed Scheduling Extension on Hadoop -- A Data Distribution Aware Task Scheduling Strategy for MapReduce System -- Cloud Computing Based Internet Data Center.
Record Nr. UNISA-996465582703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cloud Computing : First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings / / edited by Martin Gilje Jaatun, Gansen Zhao, Chunming Rong
Cloud Computing : First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings / / edited by Martin Gilje Jaatun, Gansen Zhao, Chunming Rong
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XX, 707 p.)
Disciplina 004.67/82
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Computer organization
Computer system failures
Computer software—Reusability
Architecture, Computer
Software engineering
Computer Communication Networks
Computer Systems Organization and Communication Networks
System Performance and Evaluation
Performance and Reliability
Computer System Implementation
Software Engineering/Programming and Operating Systems
Soggetto genere / forma Kongress.
Online-Publikation
Peking (2009)
ISBN 3-642-10665-X
Classificazione DAT 060f
DAT 250f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- The Many Colors and Shapes of Cloud -- Biomedical Case Studies in Data Intensive Computing -- An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf -- Cloudbus Toolkit for Market-Oriented Cloud Computing -- Full Papers -- Self-healing and Hybrid Diagnosis in Cloud Computing -- Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges -- Trust Model to Enhance Security and Interoperability of Cloud Environment -- Dynamic Malicious Code Detection Based on Binary Translator -- A Privacy Manager for Cloud Computing -- Privacy in a Semantic Cloud: What’s Trust Got to Do with It? -- Data Protection-Aware Design for Cloud Services -- Accountability as a Way Forward for Privacy Protection in the Cloud -- Towards an Approach of Semantic Access Control for Cloud Computing -- Identity-Based Authentication for Cloud Computing -- Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography -- Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes -- Data Center Consolidation: A Step towards Infrastructure Clouds -- Decentralized Service Allocation in a Broker Overlay Based Grid -- DisTec: Towards a Distributed System for Telecom Computing -- Cloud Computing Boosts Business Intelligence of Telecommunication Industry -- Composable IO: A Novel Resource Sharing Platform in Personal Clouds -- SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud -- Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation -- Cloud-Oriented Virtual Machine Management with MLN -- A Systematic Process for Developing High Quality SaaS Cloud Services -- Cloud Computing Service Composition and Search Based on Semantic -- Deploying Mobile Computation in Cloud Service -- A Novel Method for Mining SaaS Software Tag via Community Detection in Software Services Network -- Retrieving and Indexing Spatial Data in the Cloud Computing Environment -- Search Engine Prototype System Based on Cloud Computing -- Distributed Structured Database System HugeTable -- Cloud Computing: A Statistics Aspect of Users -- An Efficient Cloud Computing-Based Architecture for Freight System Application in China Railway -- Web Server Farm in the Cloud: Performance Evaluation and Dynamic Architecture -- SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres -- CloudWF: A Computational Workflow System for Clouds Based on Hadoop -- A Novel Multipath Load Balancing Algorithm in Fat-Tree Data Center -- Scheduling Active Services in Clustered JBI Environment -- Task Parallel Scheduling over Multi-core System -- Cost-Minimizing Scheduling of Workflows on a Cloud of Memory Managed Multicore Machines -- Green Cloud on the Horizon -- Industrial Cloud: Toward Inter-enterprise Integration -- Community Cloud Computing -- A Semantic Grid Oriented to E-Tourism -- Irregular Community Discovery for Social CRM in Cloud Computing -- A Contextual Information Acquisition Approach Based on Semantics and Mashup Technology -- Evaluating MapReduce on Virtual Machines: The Hadoop Case -- APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing -- Short Papers -- Secure Document Service for Cloud Computing -- Privacy of Value-Added Context-Aware Service Cloud -- A Simple Technique for Securing Data at Rest Stored in a Computing Cloud -- Access Control of Cloud Service Based on UCON -- Replica Replacement Strategy Evaluation Based on Grid Locality -- Performance Evaluation of Cloud Service Considering Fault Recovery -- BlueSky Cloud Framework: An E-Learning Framework Embracing Cloud Computing -- Cloud Infrastructure & Applications – CloudIA -- One Program Model for Cloud Computing -- Enterprise Cloud Architecture for Chinese Ministry of Railway -- Research on Cloud Computing Based on Deep Analysis to Typical Platforms -- Automatic Construction of SP Problem-Solving Resource Space -- An Idea of Special Cloud Computing in Forest Pests’ Control -- IBM Cloud Computing Powering a Smarter Planet -- Cloud Computing: An Overview -- Integrating Cloud-Computing-Specific Model into Aircraft Design -- Towards a Theory of Universally Composable Cloud Computing -- A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture -- Price-Oriented Trading Optimization for Grid Resource -- A Requirements Recommendation Method Based on Service Description -- Extending YML to Be a Middleware for Scientific Cloud Computing -- Power-Aware Management in Cloud Data Centers -- Parallel K-Means Clustering Based on MapReduce -- Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce -- Distributed Scheduling Extension on Hadoop -- A Data Distribution Aware Task Scheduling Strategy for MapReduce System -- Cloud Computing Based Internet Data Center.
Record Nr. UNINA-9910483687203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cloud Computing and Big Data: Technologies, Applications and Security / / edited by Mostapha Zbakh, Mohammed Essaaidi, Pierre Manneback, Chunming Rong
Cloud Computing and Big Data: Technologies, Applications and Security / / edited by Mostapha Zbakh, Mohammed Essaaidi, Pierre Manneback, Chunming Rong
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 394 p. 126 illus.)
Disciplina 629.8
Collana Lecture Notes in Networks and Systems
Soggetto topico Mechatronics
Computational intelligence
Computational Intelligence
ISBN 3-319-97719-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Elliptic Curve Qu-Vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage -- Cloud Computing: Overview and Risk Identification Based on Classification by Type -- Authentication Model for Mobile Cloud Computing Database Service -- FADETPM: Novel Approach of File Assured Deletion Based on Trusted Platform Module -- Issues and Threats of Cloud Data Storage -- Challenges of Crowd Sensing for Cost-effective Data Management in the Cloud -- On the Security of Medical Image Processing in Cloud Environment -- Implementations of Intrusion Detection Architectures in Cloud Computing -- Privacy in Big Data Through Variable t-Closeness for MSN Attributes -- The Big Data-RTAP: Toward a Secured Video Surveillance System in Smart Environment -- Optimizations in Fully Homomorphic Encryption -- Support Cloud SLA establishment using MDE -- A New Parallel and Distributed Approach for Large Scale Images Retrieval -- Classification of Social Network Data Using a Dictionary-Based Approach -- Parallel and Distributed Map-Reduce Models for External Clustering Validation Indexes -- Workflow Scheduling Issues and Techniques in Cloud Computing: A Systematic Literature Review -- A Review of Green Cloud Computing Techniques -- Towards a smart exploitation of GPUs for low energy motion estimation using Full HD and 4K Videos -- Machine Learning applications in supply chains: Long Short-Term Memory for demand forecasting -- Performance Analysis of Preconditioned Conjugate Gradient Solver on Heterogeneous (Multi-CPUs/Multi-GPUs) Architecture -- Runtime prediction of optimizers using improved support vector machine -- AND/OR directed graph for dynamic web service composition -- An NLP based text-to-speech synthesizer for Moroccan Arabic -- Context-Aware Routing Protocol for Mobile WSN : Fire Forest Detection. .
Record Nr. UNINA-9910483178703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong
Autore #Cayirci E. (Erdal)
Edizione [1st edition]
Pubbl/distr/stampa Chichester, U.K. : , : Wiley, , c2009
Descrizione fisica 1 online resource (283 p.)
Disciplina 005.8
621.384
Altri autori (Persone) RongChunming
Soggetto topico Ad hoc networks (Computer networks) - Security measures
Computer networks - Security measures
ISBN 1-282-68998-3
9786612689987
0-470-51678-X
0-470-51677-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.2 Sensor and Actuator Networks -- 2.3 Mesh Networks. / -- 2.4 Tactical Communications and Networks -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- .6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.2 Advanced Radio Technologies -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.2 Error Control -- 4.3 Wireless Metropolitan Area Networks -- 4.4 Wireless Local Area Networks -- 4.5 Wireless Personal Area Networks. / -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other Challenges and Security Aspects -- 7.1 Localization and Positioning -- 7.2 Time Synchronization -- 7.3 Addressing -- 7.4 Data Aggregation and Fusion -- 7.5 Data Querying -- 7.6 Coverage -- 7.7 Mobility Management -- 7.8 Cross-layer Design -- 7.9 Review Questions -- Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking -- 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks -- 8.1 Security Attacks -- 8.2 Attackers -- 8.3 Security Goals -- 8.4 Review Questions -- 9 Cryptography -- 9.1 Symmetric Encryption -- 9.2 Asymmetric Encryption -- 9.3 Hash Functions and Message Authentication Code -- 9.4 Cascading Hashing -- 9.5 Review Questions -- 10 Challenges and Solutions: Basic Issues -- 10.1 Bootstrapping Security in Ad Hoc Networks.
10.2 Bootstrapping Security in Sensor Networks -- 10.3 Key Distribution, Exchange and Management -- 10.4 Authentication Issues -- 10.5 Integrity -- 10.6 Review Questions -- 11 Challenges and Solutions: Protection -- 11.1 Privacy and Anonymity -- 11.2 Intrusion Detection -- 11.3 Defense Against Traffic Analysis -- 11.4 Access Control and Secure Human / Computer Interaction -- 11.5 Software-Based Anti-Tamper Techniques -- 11.6 Tamper Resilience: Hardware Protection -- 11.7 Availability and Plausibility -- 11.8 Review Questions -- 12 Secure Routing -- 12.1 Defense Against Security Attacks in Ad Hoc Routing -- 12.2 Secure Ad Hoc Routing Protocols -- 12.3 Further Reading -- 12.4 Review Questions -- 13 Specific Challenges and Solutions -- 13.1 SPINS: Security Protocols for Sensor Networks -- 13.2 Quarantine Region Scheme for Spam Attacks -- 13.3 Secure Charging and Rewarding Scheme -- 13.4 Secure Node Localization -- 13.5 Secure Time Synchronization -- 13.6 Secure Event and Event Boundary Detection -- 13.7 Review Questions -- 14 Information Operations and Electronic Warfare -- 14.1 Electronic Support -- 14.2 Electronic Attack -- 14.3 Electronic Protection -- 14.4 Review Questions -- 15 Standards -- 15.1 X.800 and RFC 2828 -- 15.2 Wired Equivalent Privacy (WEP) -- 15.3 Wi-Fi Protected Access (WPA) -- References -- Index.
Record Nr. UNINA-9910145261303321
#Cayirci E. (Erdal)  
Chichester, U.K. : , : Wiley, , c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong
Autore #Cayirci E. (Erdal)
Edizione [1st edition]
Pubbl/distr/stampa Chichester, U.K. : , : Wiley, , c2009
Descrizione fisica 1 online resource (283 p.)
Disciplina 005.8
621.384
Altri autori (Persone) RongChunming
Soggetto topico Ad hoc networks (Computer networks) - Security measures
Computer networks - Security measures
ISBN 1-282-68998-3
9786612689987
0-470-51678-X
0-470-51677-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.2 Sensor and Actuator Networks -- 2.3 Mesh Networks. / -- 2.4 Tactical Communications and Networks -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- .6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.2 Advanced Radio Technologies -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.2 Error Control -- 4.3 Wireless Metropolitan Area Networks -- 4.4 Wireless Local Area Networks -- 4.5 Wireless Personal Area Networks. / -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other Challenges and Security Aspects -- 7.1 Localization and Positioning -- 7.2 Time Synchronization -- 7.3 Addressing -- 7.4 Data Aggregation and Fusion -- 7.5 Data Querying -- 7.6 Coverage -- 7.7 Mobility Management -- 7.8 Cross-layer Design -- 7.9 Review Questions -- Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking -- 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks -- 8.1 Security Attacks -- 8.2 Attackers -- 8.3 Security Goals -- 8.4 Review Questions -- 9 Cryptography -- 9.1 Symmetric Encryption -- 9.2 Asymmetric Encryption -- 9.3 Hash Functions and Message Authentication Code -- 9.4 Cascading Hashing -- 9.5 Review Questions -- 10 Challenges and Solutions: Basic Issues -- 10.1 Bootstrapping Security in Ad Hoc Networks.
10.2 Bootstrapping Security in Sensor Networks -- 10.3 Key Distribution, Exchange and Management -- 10.4 Authentication Issues -- 10.5 Integrity -- 10.6 Review Questions -- 11 Challenges and Solutions: Protection -- 11.1 Privacy and Anonymity -- 11.2 Intrusion Detection -- 11.3 Defense Against Traffic Analysis -- 11.4 Access Control and Secure Human / Computer Interaction -- 11.5 Software-Based Anti-Tamper Techniques -- 11.6 Tamper Resilience: Hardware Protection -- 11.7 Availability and Plausibility -- 11.8 Review Questions -- 12 Secure Routing -- 12.1 Defense Against Security Attacks in Ad Hoc Routing -- 12.2 Secure Ad Hoc Routing Protocols -- 12.3 Further Reading -- 12.4 Review Questions -- 13 Specific Challenges and Solutions -- 13.1 SPINS: Security Protocols for Sensor Networks -- 13.2 Quarantine Region Scheme for Spam Attacks -- 13.3 Secure Charging and Rewarding Scheme -- 13.4 Secure Node Localization -- 13.5 Secure Time Synchronization -- 13.6 Secure Event and Event Boundary Detection -- 13.7 Review Questions -- 14 Information Operations and Electronic Warfare -- 14.1 Electronic Support -- 14.2 Electronic Attack -- 14.3 Electronic Protection -- 14.4 Review Questions -- 15 Standards -- 15.1 X.800 and RFC 2828 -- 15.2 Wired Equivalent Privacy (WEP) -- 15.3 Wi-Fi Protected Access (WPA) -- References -- Index.
Record Nr. UNINA-9910830815703321
#Cayirci E. (Erdal)  
Chichester, U.K. : , : Wiley, , c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ubiquitous Intelligence and Computing [[electronic resource] ] : 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings / / edited by Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence Tianruo Yang
Ubiquitous Intelligence and Computing [[electronic resource] ] : 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings / / edited by Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence Tianruo Yang
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XVIII, 763 p.)
Disciplina 005.437
4.019
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico User interfaces (Computer systems)
Application software
Computer communication systems
Computer security
Artificial intelligence
Computers and civilization
User Interfaces and Human Computer Interaction
Information Systems Applications (incl. Internet)
Computer Communication Networks
Systems and Data Security
Artificial Intelligence
Computers and Society
ISBN 3-540-69293-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Challenges in the Design and Development of Context-Aware Applications -- The Importance of Including the Haptics Factor in Interaction Design -- Regular Papers -- Security Policy Integration and Conflict Reconciliation for Collaborations among Organizations in Ubiquitous Computing Environments -- Improved Weighted Centroid Localization in Smart Ubiquitous Environments -- A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment -- Pervasive Services on the Move: Smart Service Diffusion on the OSGi Framework -- Robots in Smart Spaces - A Case Study of a u-Object Finder Prototype - -- Biometrics Driven Smart Environments: Abstract Framework and Evaluation -- A Structured Methodology of Scenario Generation and System Analysis for Ubiquitous Smart Space Development -- Capturing Semantics for Information Security and Privacy Assurance -- A Framework for Context-Aware Home-Health Monitoring -- Semantic Learning Space: An Infrastructure for Context-Aware Ubiquitous Learning -- A Comprehensive Approach for Situation-Awareness Based on Sensing and Reasoning about Context -- Context-Adaptive User Interface in Ubiquitous Home Generated by Bayesian and Action Selection Networks -- Use Semantic Decision Tables to Improve Meaning Evolution Support Systems -- Combining User Profiles and Situation Contexts for Spontaneous Service Provision in Smart Assistive Environments -- Ubiquitous Phone System -- Utilizing RFIDs for Location Aware Computing -- A Component-Based Ambient Agent Model for Assessment of Driving Behaviour -- A Cartesian Robot for RFID Signal Distribution Model Verification -- Self-Localization in a Low Cost Bluetooth Environment -- Penetration Testing of OPC as Part of Process Control Systems -- Intersection Location Service for Vehicular Ad Hoc Networks with Cars in Manhattan Style Movement Patterns -- Ubiquitous and Robust Text-Independent Speaker Recognition for Home Automation Digital Life -- Energy Efficient In-Network Phase RFID Data Filtering Scheme -- Energy-Efficient Tracking of Continuous Objects in Wireless Sensor Networks -- Data Randomization for Lightweight Secure Data Aggregation in Sensor Network -- Mobile Sink Routing Protocol with Registering in Cluster-Based Wireless Sensor Networks -- Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks -- An Energy-Efficient Query Processing Algorithm for Wireless Sensor Networks -- Special Session Papers -- Rule Selection for Collaborative Ubiquitous Smart Device Development: Rough Set Based Approach -- An Object-Oriented Framework for Common Abstraction and the Comet-Based Interaction of Physical u-Objects and Digital Services -- Personalizing Threshold Values on Behavior Detection with Collaborative Filtering -- IP Traceback Using Digital Watermark and Honeypot -- Multi-priority Multi-path Selection for Video Streaming in Wireless Multimedia Sensor Networks -- Energy Constrained Multipath Routing in Wireless Sensor Networks -- Controlling Uncertainty in Personal Positioning at Minimal Measurement Cost -- RFID System Security Using Identity-Based Cryptography -- RFID: An Ideal Technology for Ubiquitous Computing? -- An Experimental Analysis of Undo in Ubiquitous Computing Environments -- Towards a Collaborative Reputation Based Service Provider Selection in Ubiquitous Computing Environments -- Petri Net-Based Episode Detection and Story Generation from Ubiquitous Life Log -- Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network -- Universal Remote Control for the Smart World -- Mobile Navigation System for the Elderly – Preliminary Experiment and Evaluation -- Time Stamp Protocol for Smart Environment Services -- An Analysis of the Manufacturing Messaging Specification Protocol -- A Long-Distance Time Domain Sound Localization -- Towards Dataintegration from WITSML to ISO 15926 -- A SIP-Based Session Mobility Management Framework for Ubiquitous Multimedia Services -- AwarePen - Classification Probability and Fuzziness in a Context Aware Application -- A Model Driven Development Method for Developing Context-Aware Pervasive Systems -- Intelligent System Architecture for Context-Awareness in Ubiquitous Computing -- User-Based Constraint Strategy in Ontology Matching -- RFID-Based Interactive Learning in Science Museums -- Real-Time Detection of Passing Objects Using Virtual Gate and Motion Vector Analysis -- A Ubiquitous Interactive Museum Guide -- Dynamic Probabilistic Packet Marking with Partial Non-Preemption -- Fractal Model Based Face Recognition for Ubiquitous Environments.
Record Nr. UNISA-996465302103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Ubiquitous Intelligence and Computing : 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings / / edited by Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence Tianruo Yang
Ubiquitous Intelligence and Computing : 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings / / edited by Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence Tianruo Yang
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XVIII, 763 p.)
Disciplina 005.437
4.019
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico User interfaces (Computer systems)
Application software
Computer communication systems
Computer security
Artificial intelligence
Computers and civilization
User Interfaces and Human Computer Interaction
Information Systems Applications (incl. Internet)
Computer Communication Networks
Systems and Data Security
Artificial Intelligence
Computers and Society
ISBN 3-540-69293-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Challenges in the Design and Development of Context-Aware Applications -- The Importance of Including the Haptics Factor in Interaction Design -- Regular Papers -- Security Policy Integration and Conflict Reconciliation for Collaborations among Organizations in Ubiquitous Computing Environments -- Improved Weighted Centroid Localization in Smart Ubiquitous Environments -- A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment -- Pervasive Services on the Move: Smart Service Diffusion on the OSGi Framework -- Robots in Smart Spaces - A Case Study of a u-Object Finder Prototype - -- Biometrics Driven Smart Environments: Abstract Framework and Evaluation -- A Structured Methodology of Scenario Generation and System Analysis for Ubiquitous Smart Space Development -- Capturing Semantics for Information Security and Privacy Assurance -- A Framework for Context-Aware Home-Health Monitoring -- Semantic Learning Space: An Infrastructure for Context-Aware Ubiquitous Learning -- A Comprehensive Approach for Situation-Awareness Based on Sensing and Reasoning about Context -- Context-Adaptive User Interface in Ubiquitous Home Generated by Bayesian and Action Selection Networks -- Use Semantic Decision Tables to Improve Meaning Evolution Support Systems -- Combining User Profiles and Situation Contexts for Spontaneous Service Provision in Smart Assistive Environments -- Ubiquitous Phone System -- Utilizing RFIDs for Location Aware Computing -- A Component-Based Ambient Agent Model for Assessment of Driving Behaviour -- A Cartesian Robot for RFID Signal Distribution Model Verification -- Self-Localization in a Low Cost Bluetooth Environment -- Penetration Testing of OPC as Part of Process Control Systems -- Intersection Location Service for Vehicular Ad Hoc Networks with Cars in Manhattan Style Movement Patterns -- Ubiquitous and Robust Text-Independent Speaker Recognition for Home Automation Digital Life -- Energy Efficient In-Network Phase RFID Data Filtering Scheme -- Energy-Efficient Tracking of Continuous Objects in Wireless Sensor Networks -- Data Randomization for Lightweight Secure Data Aggregation in Sensor Network -- Mobile Sink Routing Protocol with Registering in Cluster-Based Wireless Sensor Networks -- Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks -- An Energy-Efficient Query Processing Algorithm for Wireless Sensor Networks -- Special Session Papers -- Rule Selection for Collaborative Ubiquitous Smart Device Development: Rough Set Based Approach -- An Object-Oriented Framework for Common Abstraction and the Comet-Based Interaction of Physical u-Objects and Digital Services -- Personalizing Threshold Values on Behavior Detection with Collaborative Filtering -- IP Traceback Using Digital Watermark and Honeypot -- Multi-priority Multi-path Selection for Video Streaming in Wireless Multimedia Sensor Networks -- Energy Constrained Multipath Routing in Wireless Sensor Networks -- Controlling Uncertainty in Personal Positioning at Minimal Measurement Cost -- RFID System Security Using Identity-Based Cryptography -- RFID: An Ideal Technology for Ubiquitous Computing? -- An Experimental Analysis of Undo in Ubiquitous Computing Environments -- Towards a Collaborative Reputation Based Service Provider Selection in Ubiquitous Computing Environments -- Petri Net-Based Episode Detection and Story Generation from Ubiquitous Life Log -- Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network -- Universal Remote Control for the Smart World -- Mobile Navigation System for the Elderly – Preliminary Experiment and Evaluation -- Time Stamp Protocol for Smart Environment Services -- An Analysis of the Manufacturing Messaging Specification Protocol -- A Long-Distance Time Domain Sound Localization -- Towards Dataintegration from WITSML to ISO 15926 -- A SIP-Based Session Mobility Management Framework for Ubiquitous Multimedia Services -- AwarePen - Classification Probability and Fuzziness in a Context Aware Application -- A Model Driven Development Method for Developing Context-Aware Pervasive Systems -- Intelligent System Architecture for Context-Awareness in Ubiquitous Computing -- User-Based Constraint Strategy in Ontology Matching -- RFID-Based Interactive Learning in Science Museums -- Real-Time Detection of Passing Objects Using Virtual Gate and Motion Vector Analysis -- A Ubiquitous Interactive Museum Guide -- Dynamic Probabilistic Packet Marking with Partial Non-Preemption -- Fractal Model Based Face Recognition for Ubiquitous Environments.
Record Nr. UNINA-9910483957503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui