Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Smart Micro-Grid Systems Security and Privacy
  • Language: en
  • Pages: 174

Smart Micro-Grid Systems Security and Privacy

  • Type: Book
  • -
  • Published: 2018-08-27
  • -
  • Publisher: Springer

This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas. It also considers scenarios where deploying smart grids can be both cost-prohibitively expensive and logistically challenging. Deploying smart microgrids instead, offers a reliable power solution but, as is the case in smart grids, a key issue is guaranteeing usability, trust, and reliability while protecting against energy theft. This book considers aspects such as state estimation, capacity planning, demand forecasting, price signals, and demand management with respect to energy theft. Straight-forward approaches to provoking energy theft on smart ...

Adaptive Cryptographic Access Control
  • Language: en
  • Pages: 147

Adaptive Cryptographic Access Control

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential. The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control presents the challenges of designing hierarchical cryptographic key management algorithms to implement Adaptive Access Control in dynamic environments and suggest solutions that will overcome these challenges. Adaptive Cryptographic Access Control is a cutting-edge book focusing specifically on this topic in relation to security and cryptographic access control. Both the theoretical and practical aspects and approaches of cryptographic access control are introduced in this book. Case studies and examples are provided throughout this book.

Theories and Intricacies of Information Security Problems
  • Language: en
  • Pages: 60

Theories and Intricacies of Information Security Problems

Keine Angaben

Database and Expert Systems Applications
  • Language: en
  • Pages: 472

Database and Expert Systems Applications

  • Type: Book
  • -
  • Published: 2017-08-11
  • -
  • Publisher: Springer

This two volume set LNCS 10438 and LNCS 10439 constitutes the refereed proceedings of the 28th International Conference on Database and Expert Systems Applications, DEXA 2017, held in Lyon, France, August 2017. The 37 revised full papers presented together with 40 short papers were carefully reviewed and selected from 166 submissions. The papers discuss a range of topics including: Semantic Web and Semantics; Graph Matching; Data Modeling, Data Abstraction, and Uncertainty; Preferences and Query Optimization; Data Integration and RDF Matching; Security and Privacy; Web Search; Data Clustering; Top-K and Skyline Queries; Data Mining and Big Data; Service Computing; Continuous and Temporal Data, and Continuous Query Language; Text Processing and Semantic Search; Indexing and Concurrency Control Methods; Data Warehouse and Data Stream Warehouse; Data Mining and Machine Learning; Recommender Systems and Query Recommendation; Graph Algorithms; Semantic Clustering and Data Classific ation.

Business process architectures with multiplicities
  • Language: en
  • Pages: 30
Critical Information Infrastructures Security
  • Language: en
  • Pages: 360

Critical Information Infrastructures Security

  • Type: Book
  • -
  • Published: 2017-11-21
  • -
  • Publisher: Springer

This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016. The 22 full papers and 8 short papers presented were carefully reviewed and selected from 58 submissions. They present the most recent innovations, trends, results, experiences and concerns in selected perspectives of critical information infrastructure protection covering the range from small-scale cyber-physical systems security via information infrastructures and their interaction with national and international infrastructures.

Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards
  • Language: en
  • Pages: 421

Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards

  • Type: Book
  • -
  • Published: 2011-12-31
  • -
  • Publisher: IGI Global

"This book is a collection of research on privacy protection technologies and their application in business organizations"--Provided by publisher.

Modeling and enacting complex data dependencies in business processes
  • Language: en
  • Pages: 52

Modeling and enacting complex data dependencies in business processes

Enacting business processes in process engines requires the coverage of control flow, resource assignments, and process data. While the first two aspects are well supported in current process engines, data dependencies need to be added and maintained manually by a process engineer. Thus, this task is error-prone and time-consuming. In this report, we address the problem of modeling processes with complex data dependencies, e.g., m:n relationships, and their automatic enactment from process models. First, we extend BPMN data objects with few annotations to allow data dependency handling as well as data instance differentiation. Second, we introduce a pattern-based approach to derive SQL queries from process models utilizing the above mentioned extensions. Therewith, we allow automatic enactment of data-aware BPMN process models. We implemented our approach for the Activiti process engine to show applicability.

Explorative authoring of Active Web content in a mobile environment
  • Language: en
  • Pages: 148

Explorative authoring of Active Web content in a mobile environment

Developing rich Web applications can be a complex job - especially when it comes to mobile device support. Web-based environments such as Lively Webwerkstatt can help developers implement such applications by making the development process more direct and interactive. Further the process of developing software is collaborative which creates the need that the development environment offers collaboration facilities. This report describes extensions of the webbased development environment Lively Webwerkstatt such that it can be used in a mobile environment. The extensions are collaboration mechanisms, user interface adaptations but as well event processing and performance measuring on mobile devices.