Narrow your search

Library

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

ULiège (1)

VIVES (1)


Resource type

book (1)


Language

English (1)


Year
From To Submit

2010 (1)

Listing 1 - 1 of 1
Sort by

Book
Autonomic and trusted computing : 7th International Conference, ATC 2010 : Xi'an, China, October 26-29, 2010 : proceedings
Authors: --- ---
ISBN: 3642165753 9786613568014 1280390093 3642165761 Year: 2010 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems––as well as services––available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi’an, China, October 26–29, 2010.

Keywords

Autonomic computing --- Engineering & Applied Sciences --- Computer Science --- Computer security --- Computer networks --- Security measures --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Informatics --- Science --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Protection --- Distributed processing --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Listing 1 - 1 of 1
Sort by