{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T17:06:05Z","timestamp":1774285565309,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":46,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540386193","type":"print"},{"value":"9783540386223","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11839569_14","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T13:21:24Z","timestamp":1159881684000},"page":"143-152","source":"Crossref","is-referenced-by-count":8,"title":["Autonomic and Trusted Computing Paradigms"],"prefix":"10.1007","author":[{"given":"Xiaolin","family":"Li","sequence":"first","affiliation":[]},{"given":"Hui","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Harrington","sequence":"additional","affiliation":[]},{"given":"Johnson","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Ganek, A.G., Corbi, T.A.: The dawning of the autonomic computing era. IBM Systems Journal\u00a042 (2003)","DOI":"10.1147\/sj.421.0005"},{"key":"14_CR2","series-title":"Cluster Computing: The Journal of Networks, Software Tools, and Application","doi-asserted-by":"publisher","DOI":"10.1201\/9781420009354","volume-title":"The Autonomic Computing Paradigm","author":"S. Hariri","year":"2006","unstructured":"Hariri, S., et al.: The Autonomic Computing Paradigm. Cluster Computing: The Journal of Networks, Software Tools, and Application, vol.\u00a08. Kluwer Academic Publishers, Dordrecht (2006)"},{"key":"14_CR3","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"J.O. Kephart","year":"2003","unstructured":"Kephart, J.O., Chess, D.M.: The vision of autonomic computing. IEEE Computer\u00a036, 41\u201350 (2003)","journal-title":"IEEE Computer"},{"key":"14_CR4","volume-title":"The Grid: Blueprint for a New Computing Infrastructure","author":"I. Foster","year":"2004","unstructured":"Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure, 2nd edn. Morgan Kaufmann, San Francisco (2004)","edition":"2"},{"key":"14_CR5","first-page":"653","volume":"93","author":"M. Parashar","year":"2005","unstructured":"Parashar, M., Browne, J.C.: Conceptual and implementation models for the grid. Proceedings of the IEEE, Special Issue on Grid Computing\u00a093, 653\u2013668 (2005)","journal-title":"Proceedings of the IEEE, Special Issue on Grid Computing"},{"key":"14_CR6","unstructured":"Horn, P.: Autonomic computing: Ibm\u2019s perspective on the state of information technology. Technical report, IBM Corporation (2001)"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/11527800_20","volume-title":"Unconventional Programming Paradigms","author":"M. Parashar","year":"2005","unstructured":"Parashar, M., Hariri, S.: Autonomic computing: An overview. In: Ban\u00e2tre, J.-P., Fradet, P., Giavitto, J.-L., Michel, O. (eds.) UPP 2004. LNCS, vol.\u00a03566, pp. 257\u2013269. Springer, Heidelberg (2005)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Salehie, M., Tahvildari, L.: Autonomic computing: Emerging trends and open problems. In: Workshop on the Design and Evolution of Autonomic Application Software, St. Louis, Missouri (2005)","DOI":"10.1145\/1083063.1083082"},{"key":"14_CR9","unstructured":"(Ibm research, policy technologies) http:\/\/www.research.ibm.com\/policytechnologies\/"},{"key":"14_CR10","volume-title":"Design for a Brain","author":"W.R. Ashby","year":"1960","unstructured":"Ashby, W.R.: Design for a Brain. Chapman and Hall Ltd, Boca Raton (1960)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Jann, J., Browning, L.M., Burugula, R.S.: Dynamic reconfiguration: Basic building blocks for autonomic computing on ibm pseries servers. IBM Systems Journal\u00a042 (2003)","DOI":"10.1147\/sj.421.0029"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Liu, H., Parashar, M., Hariri, S.: A component-based programming framework for autonomic applications. In: The 1st IEEE International Conference on Autonomic Computing (ICAC 2004), New York (2004)","DOI":"10.1109\/ICAC.2004.1301341"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Parashar, M., et al.: Automate: Enabling autonomic grid applications. Cluster Computing: The Journal of Networks, Software Tools, and Applications, Special Issue on Autonomic Computing\u00a09 (2003)","DOI":"10.1007\/s10586-006-7561-5"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Hau, J., Lee, W., Newhouse, S.: Autonomic service adaptation using ontological annotation. In: The 4th Int. Workshop on Grid Computing (Grid 2003), Phoenix, AZ (2003)","DOI":"10.1109\/GRID.2003.1261693"},{"key":"14_CR15","unstructured":"Booth, D., Hass, H., McCabe, F., Newcomer, E., Champion, M., Ferris, C., Orchard, D.: Web services architecture, Amorphous Computing, http:\/\/www.w3.org\/TR\/ws-arch\/"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_11","volume-title":"Peer-to-Peer Systems II","author":"I. Foster","year":"2003","unstructured":"Foster, I., Iamnitchi, A.: On death, taxes, and the convergence of peer-to-peer and grid computing. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol.\u00a02735, Springer, Heidelberg (2003)"},{"key":"14_CR17","unstructured":"Kaufman, J., Lehman, T.: Optimalgrid: The almaden smartgrid project autonomous optimization of distributed computing on the grid. Newsletter of IEEE Task Force on Cluster Computing\u00a04 (2003)"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Liu, H., Bhat, V., Parashar, M., Klasky, S.: An autonomic service architecture for self-managing grid applications. In: The 6th IEEE\/ACM International Workshop on Grid Computing (Grid 2005), Seattle, WA (2005)","DOI":"10.1109\/GRID.2005.1542734"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Pattnaik, P., Ekanadham, K., Jann, J.: Autonomic Computing and Grid, 2003 edn. Grid Computing: Making the Global Infrastructure a Reality. Wiley, Chichester (2003)","DOI":"10.1002\/0470867167.ch13"},{"key":"14_CR20","unstructured":"Adams, B., Brettf, P., Iyer, S., Milojicic, D., Rafaeli, S., Talwar, V.: Scalable management: Techonologies for management of large-scale, distributed systems. In: The Second International Conference on Autonomic Computing (ICAC 2005) (2005)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Gurguis, S., Zeid, A.: Towards autonomic web services: Achieving self-healing using web services. In: 2005 Workshop on Design and Evolution of Autonomic Application Software, St. Louis, Missouri (2005)","DOI":"10.1145\/1083063.1083069"},{"key":"14_CR22","unstructured":"Web services description language (wsdl), http:\/\/www.w3.org\/TR\/wsdl"},{"key":"14_CR23","unstructured":"Web ontology language (owl), http:\/\/www.w3.org\/TR\/owl-features\/"},{"key":"14_CR24","unstructured":"Recovery-oriented computing (roc) project, http:\/\/roc.cs.berkeley.edu\/"},{"key":"14_CR25","volume-title":"Artificial Intelligence: A Modern Approach","author":"S. Russell","year":"2003","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 2nd edn. Prentice-Hall, Englewood Cliffs (2003)","edition":"2"},{"key":"14_CR26","series-title":"Lecture Notes in Artificial Intelligence","volume-title":"Nature-Inspired Approaches to Software Engineering (Engineering Self-Organising Applications Workshop, ESOA 2003)","author":"G.D.M. Serugendo","year":"2004","unstructured":"Serugendo, G.D.M., Karageorgos, A., Rana, O.F., Zambonelli, F.: Engineering self-organising systems. In: Di Marzo Serugendo, G., Karageorgos, A., Rana, O.F., Zambonelli, F. (eds.) ESOA 2003. LNCS (LNAI), vol.\u00a02977, Springer, Heidelberg (2004)"},{"key":"14_CR27","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1126\/science.1095845","volume":"304","author":"J. Balthrop","year":"2004","unstructured":"Balthrop, J., Forrest, S., Newman, M.E.J., Williamson, M.M.: Technological networks and the spread of computer virues. Science\u00a0304, 527\u2013529 (2004)","journal-title":"Science"},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2005.40","volume":"3","author":"R. Oppliger","year":"2005","unstructured":"Oppliger, R., Ryze, R.: Does trusted computing remedy computer security problems? Security & Privacy Magazine, IEEE\u00a03, 16\u201319 (2005)","journal-title":"Security & Privacy Magazine, IEEE"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Balfe, S., Lakhani, A.D., Paterson, K.G.: Trusted computing: Providing security for peer-to-peer networks. In: Peer-to-Peer Computing. Fifth IEEE International Conference, pp. 117\u2013127 (2004)","DOI":"10.1049\/PBPC006E_ch10"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Park, J.S., Jayaprakash, G.: Component integrity check and recovery against malicious codes. In: International Workshop on Trusted and Autonomic Computing Systems (TACS 2006) (to apppear, 2006)","DOI":"10.1109\/AINA.2006.131"},{"key":"14_CR31","unstructured":"Amorphous computing, http:\/\/www.swiss.csail.mit.edu\/projects\/amorphous\/"},{"key":"14_CR32","unstructured":"Anthill, http:\/\/www.cs.unibo.it\/projects\/anthill\/"},{"key":"14_CR33","unstructured":"Autoadmin, http:\/\/research.microsoft.com\/dmx\/autoadmin\/default.asp"},{"key":"14_CR34","unstructured":"Dong, X., Hariri, S., Xue, L., Chen, H., Zhang, M., Pavuluri, S., Rao, S.: Autonomia: an autonomic computing environment. In: IEEE International Conference on Performance, Computing, and Communications (IPCC 2003) (2003)"},{"key":"14_CR35","unstructured":"Kinestheticsextreme, http:\/\/www.psl.cs.columbia.edu\/kx\/index.html"},{"key":"14_CR36","unstructured":"Oceanstore, http:\/\/oceanstore.cs.berkeley.edu\/"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Lohman, G.M., Lightstone, S.S.: Smart: Making db2 (more) autonomic. In: 28th International Conference on Very Large Data Bases (VLDB 2002), Hong Kong, China (2002)","DOI":"10.1016\/B978-155860869-6\/50085-8"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Chess, D.M., Palmer, C.C., White, S.R.: Security in an autonomic computing environment. IBM Systems Journal\u00a042 (2003)","DOI":"10.1147\/sj.421.0107"},{"key":"14_CR39","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MC.2002.1023792","volume":"35","author":"B. Arbaugh","year":"2002","unstructured":"Arbaugh, B.: Improving the tcpa specification. Computer\u00a035, 77\u201379 (2002)","journal-title":"Computer"},{"key":"14_CR40","unstructured":"Kelly, R.: A survey of trusted computing specifications and related technologies. Technical report, SANS Institute (2003)"},{"key":"14_CR41","doi-asserted-by":"crossref","unstructured":"Reid, J., Nieto, M.G., Dawson, E., Okamoto, E.: Privacy and trusted computing. In: Proceedings of 14th International Workshop on Database and Expert Systems Applications, 2003, pp. 383\u2013388 (2003)","DOI":"10.1109\/DEXA.2003.1232052"},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Cahill, V., et al.: Using trust for secure collaboration in uncertain environments. In: IEEE Pervasive Computing Mobile and Ubiquitous Computing, vol.\u00a02, pp. 52\u201361 (2003)","DOI":"10.1109\/MPRV.2003.1228527"},{"key":"14_CR43","unstructured":"Oppenheimer, D.L., Martonosi, M.R.: Performance signatures: A mechanism for intrusion detection. In: Proceedings of the 1997 IEEE Information Survivability Workshop, San Diego, CA (1997)"},{"key":"14_CR44","unstructured":"Part, S.J., Sandhu, R.S.: Binding identities and attributes using digitally signed certificates. In: Proceedings of 16th Annual Conference on Computer Security Application (2000)"},{"key":"14_CR45","unstructured":"Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The physiology of the grid, http:\/\/www.globus.org\/alliance\/publications\/papers\/ogsa.pdf"},{"key":"14_CR46","unstructured":"The ws-resource framework, http:\/\/www.globus.org\/wsrf\/specs\/ws-wsrf.pdf"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11839569_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T21:21:25Z","timestamp":1707254485000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11839569_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540386193","9783540386223"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/11839569_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}