You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This book's main objective is to present some of the key approaches, research lines, and challenges that exist in the field of security in SOA systems"--Provided by publisher.
Design and Implementation of service-oriented architectures imposes a huge number of research questions from the fields of software engineering, system analysis and modeling, adaptability, and application integration. Component orientation and web services are two approaches for design and realization of complex web-based system. Both approaches allow for dynamic application adaptation as well as integration of enterprise application. Commonly used technologies, such as J2EE and .NET, form de facto standards for the realization of complex distributed systems. Evolution of component systems has lead to web services and service-based architectures. This has been manifested in a multitude of in...
This book constitutes the refereed proceedings of the 14th International Conference on Database and Expert Systems Applcations, DEXA 2003, held in Prague, Czech Republic, in September 2003. The 91 revised full papers presented together with an invited paper and a position paper were carefully reviewed and selected from 236 submissions. The papers are organized in topical sections on XML, data modeling, spatial database systems, mobile computing, transactions, bioinformatics, information retrieval, multimedia databases, Web applications, ontologies, object-oriented databases, query optimization, workflow systems, knowledge engineering, and security.
"This book provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications"--Provided by publisher.
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2012 and ICEUTE 2012, both conferences held in the beautiful and historic city of Ostrava (Czech Republic), in September 2012. CISIS aims to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2012 International Program C...
th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and te- communications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (- ternational Conf. on e-Business), SECRYPT (International Conf. on Security and Cryptography), SIGMAP (Int’l Conf. on Signal Processing and Multimedia) and WINSYS (International Conf. on Wireless Informa...
Drawing on extensive ethnographic research, Anita Carrasco examines the socio-environmental impacts of contemporary mining on the Atacameños, an indigenous community in northern Chile, and their home in the Atacama Desert, one of the driest regions in the world. Carrasco describes the impacts of short-term mining corporations like Anaconda Copper that arrived, destroyed, and departed, and explains the positive and negative memories of those left behind. Embracing the Anaconda: A Chronicle of Atacameño Life and Mining in the Andes is recommended for students and scholars of anthropology, sociology, environmental studies, race and ethnic studies, and Latin American studies.
"This book offers new and established perspectives on architectures, services and the resulting impact of emerging computing technologies, including investigation of practical and theoretical issues in the related fields of grid, cloud, and high performance computing"--Provided by publisher.
On behalf of the Organizing Committee, we would like to welcome you to the proccedings of the 23rd International Conference on Conceptual Modeling (ER 2004). This conference provided an international forum for technical discussion on conceptual modeling of information systems among researchers, developers and users. This was the third time that this conference was held in Asia; the?rst time was in Singapore in 1998 and the second time was in Yokohama, Japan in 2001. China is the third largest nation with the largest population in the world. Shanghai, the largest city in China and a great metropolis, famous in Asia and throughout the world, is therefore a most appropriate location to host thi...