Abstract is missing.
- Enhancing OpenID through a Reputation FrameworkFélix Gómez Mármol, Marcus Quintino Kuhnen, Gregorio Martínez Pérez. 1-18 [doi]
- Concept of a Reflex Manager to Enhance the Planner Component of an Autonomic / Organic SystemJulia Schmitt, Michael Roth, Rolf Kiefhaber, Florian Kluge, Theo Ungerer. 19-30 [doi]
- Safe Runtime Validation of Behavioral Adaptations in Autonomic SoftwareTariq M. King, Andrew A. Allen, Rodolfo Cruz, Peter J. Clarke. 31-46 [doi]
- A Configurable Environment Simulation Tool for Embedded SoftwareYuying Wang, Xingshe Zhou, Yunwei Dong, Sha Liu. 47-59 [doi]
- An Adaptive Management Mechanism for Resource Scheduling in Multiple Virtual Machine SystemJian Wan, Laurence Tianruo Yang, Yunfa Li, Xianghua Xu, Naixue Xiong. 60-74 [doi]
- Virtualization with Automated Services Catalog for Providing Integrated Information Technology InfrastructureRobson de Oliveira Albuquerque, Luis Javier García-Villalba, Osmar Ribeiro Torres, Flavio Elias Gomes de Deus. 75-91 [doi]
- Research on Modeling and Analysis of CPSZhang Yu, Dong Yunwei, Zhang Fan, Zhang Yunfeng. 92-105 [doi]
- Towards a Protocol for Autonomic Covert CommunicationWanqi Li, Guanglei He. 106-117 [doi]
- Autonomous Online Expansion Technology for Wireless Sensor Network Based Manufacturing SystemMd. Emdadul Haque, Fan Wei, Takehiro Gouda, Xiaodong Lu, Kinji Mori. 118-131 [doi]
- Self-organized Message Scheduling for Asynchronous Distributed Embedded SystemsTobias Ziermann, Zoran Salcic, Jürgen Teich. 132-148 [doi]
- Hierarchical-CPK-Based Trusted Computing Cryptography SchemeFajiang Yu, Tong Li, Yang Lin, Huanguo Zhang. 149-163 [doi]
- Facilitating the Use of TPM Technologies Using the Serenity FrameworkAntonio Muñoz, Antonio Maña. 164-174 [doi]
- Spam Detection on Twitter Using Traditional ClassifiersM. McCord, M. Chuah. 175-186 [doi]
- True Trustworthy Elections: Remote Electronic Voting Using Trusted ComputingMatt Smart, Eike Ritter. 187-202 [doi]
- A Survey of Security Issues in Trust and Reputation Systems for E-CommerceStefan Spitz, York Tüchelmann. 203-214 [doi]
- Copyright Protection in P2P Networks by False Pieces PollutionChun-Hsin Wang, Chuang-Yang Chiu. 215-227 [doi]
- Detection and Classification of Different Botnet C&C ChannelsGregory Fedynyshyn, Mooi Choo Chuah, Gang Tan. 228-242 [doi]
- A Method for Constructing Fault Trees from AADL ModelsYue Li, Yi an Zhu, Chun-yan Ma, Meng Xu. 243-258 [doi]