![]() |
![]() |
Your cart is empty |
||
Showing 1 - 2 of 2 matches in All Departments
ThisvolumecontainstheproceedingsofATC2009, the6thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Brisbane, A- tralia, during July 7-9, 2009. The conference was technically co-sponsored by the IEEE and the IEEE Computer Society Technical Committee on Scalable Computing. ATC 2009 was accompanied by three workshops on a variety of research challenges within the area of autonomic and trusted computing. ATC 2009 is a successor of the First International Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005, Japan), the International Workshop on Trusted and Autonomic Computing Systems (TACS 2006, Austria), the Third International Conference on Autonomic and Trusted Computing (ATC 2006, China), the 4th International Conference on Autonomic and Trusted Computing (ATC 2007, Hong Kong), and the 5th International Conference on Autonomic and Trusted Computing (ATC 2008, Norway) Computing systems including hardware, software, communication and n- worksaregrowingdramaticallyinbothscale andheterogeneity, becoming overly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing focuses on se- manageable computing and communication systems that exhibit self-awareness, self-con?guration, self-optimization, self-healing, self-protection and other self-x operationsto the maximumextent possible without humaninterventionorgu- ance. Organiccomputingadditionallyemphasizesnatural-analogueconceptslike self-organization and controlled emergence. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and to retain con?dence that the system will not fa
The 2009 Australasian Conference on Information Security and Privacy was the 14th in an annual series that started in 1996. Over the years ACISP has grown froma relativelysmall conferencewith a largeproportionof paperscoming from Australia into a truly international conference with an established reputation. ACISP 2009 was held at Queensland University of Technology in Brisbane, d- ing July 1-3, 2009. This year there were 106 paper submissions and from those 30 papers were accepted for presentation, but one was subsequently withdrawn. Authors of - cepted papers came from 17 countries and 4 continents, illustrating the inter- tional ?avorof ACISP. We would like to extend our sincere thanks to all authors who submitted papers to ACISP 2009. The contributed papers were supplemented by two invited talks from e- nent researchers in information security. Basie von Solms (University of Joh- nesburg), currently President of IFIP, raised the question of how well dressed is the information security king. L. Jean Camp (Indiana University) talked about how to harden the network from the friend within. We are grateful to both of them for sharing their extensive knowledge and setting challenging questions for the ACISP 2009 delegates. We were fortunate to have an energetic team of experts who formed the Program Committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewedpapers in their particularareasof expertise.
|
![]() ![]() You may like...
Multilingualism and government: Belgium…
Kas Deprez, Theo du Plessis
Paperback
R550
Discovery Miles 5 500
BGE S1-S3 Mathematics & Numeracy: Second…
Helen Kelly, Kate Mcquillan, …
Paperback
R800
Discovery Miles 8 000
|