Improving the TCPA Specification
Computer
The Vision of Autonomic Computing
Computer
Artificial Intelligence: A Modern Approach
Artificial Intelligence: A Modern Approach
Binding identities and attributes using digitally signed certificates
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Autonomic Service Adaptation in ICENI using Ontological Annotation
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
The Grid 2: Blueprint for a New Computing Infrastructure
The Grid 2: Blueprint for a New Computing Infrastructure
The dawning of the autonomic computing era
IBM Systems Journal
Security in an autonomic computing environment
IBM Systems Journal
Does Trusted Computing Remedy Computer Security Problems?
IEEE Security and Privacy
A Component-Based Programming Model for Autonomic Applications
ICAC '04 Proceedings of the First International Conference on Autonomic Computing
Towards autonomic web services: achieving self-healing using web services
DEAS '05 Proceedings of the 2005 workshop on Design and evolution of autonomic application software
Autonomic computing: emerging trends and open problems
DEAS '05 Proceedings of the 2005 workshop on Design and evolution of autonomic application software
Trusted Computing: Providing Security for Peer-to-Peer Networks
P2P '05 Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing
The Autonomic Computing Paradigm
Cluster Computing
Component Integrity Check and Recovery Against Malicious Codes
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
An Autonomic Service Architecture for Self-Managing Grid Applications
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
SMART: making DB2 (more) autonomic
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
Autonomic computing: an overview
UPP'04 Proceedings of the 2004 international conference on Unconventional Programming Paradigms
Computer Networks: The International Journal of Computer and Telecommunications Networking
Managing risks in an open computing environment using mean absolute deviation portfolio optimization
Future Generation Computer Systems
Hi-index | 0.00 |
The emerging autonomic computing technology has been hailed by world-wide researchers and professionals in academia and industry. Besides four key capabilities, well known as self-CHOP, we propose an additional self-regulating capability to explicitly emphasize the policy-driven self-manageability and dynamic policy derivation and enactment. Essentially, these five capabilities, coined as Self-CHROP, define an autonomic system along with other minor properties. Trusted computing targets guaranteed secured systems. Self-protection alone does not ensure the trustworthiness in autonomic systems. The new trend is to integrate both towards trusted autonomic computing systems. This paper presents a comprehensive survey of the autonomic and trusted computing paradigms and a preliminary conceptual architecture towards trustworthy autonomic grid computing.