ThisvolumecontainstheproceedingsofATC2008, the5thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Oslo, Norway, d- ing June 23-25, 2008. ATC 2008 is a successor of the First IFIP Workshop on Trusted and Au- nomic Ubiquitous and Embedded Systems (TAUES 2005, Japan), the Inter- tional Workshop on Trusted and Autonomic Computing Systems (TACS 2006, Austria), the Third International Conference on Autonomic and Trusted C- ...
Read More
ThisvolumecontainstheproceedingsofATC2008, the5thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Oslo, Norway, d- ing June 23-25, 2008. ATC 2008 is a successor of the First IFIP Workshop on Trusted and Au- nomic Ubiquitous and Embedded Systems (TAUES 2005, Japan), the Inter- tional Workshop on Trusted and Autonomic Computing Systems (TACS 2006, Austria), the Third International Conference on Autonomic and Trusted C- puting (ATC 2006, China), and the 4th International Conference on Autonomic and Trusted Computing (ATC 2007, Hong Kong). Computing systems including hardware, software, communication and n- worksaregrowingdramaticallyinbothscale andheterogeneity, becoming overly complex. Such complexity is getting even more critical with the ubiquitous p- meation of embedded devices and other pervasive systems. To cope with the growingandubiquitous complexity, Autonomic Computing(AC)focuses onse- manageable computing and communication systems that exhibit self-awareness, self-con?guration, self-optimization, self-healing, self-protection and other self-x operationsto the maximumextent possible without humaninterventionorgu- ance. Organic Computing (OC) additionally emphasizes natural-analogue c- cepts like self-organization and controlled emergence. Any autonomic or organic system must be trustworthy to avoid the risk of losingcontrolandto retaincon?dencethatthe systemwillnotfail.Trustand/or distrust relationships in the Internet and in pervasive infrastructures are key factorsinenablingdynamicinteractionandcooperationofvarioususers, systems and services. Trusted/Trustworthy Computing (TC) aims at making computing and communication systems as well as services available, predictable, traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc.
Read Less