You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framewo...
LNBIP 99 and LNBIP 100 together constitute the thoroughly refereed proceedings of 12 international workshops held in Clermont-Ferrand, France, in conjunction with the 9th International Conference on Business Process Management, BPM 2011, in August 2011. The 12 workshops focused on Business Process Design (BPD 2011), Business Process Intelligence (BPI 2011), Business Process Management and Social Software (BPMS2 2011), Cross-Enterprise Collaboration (CEC 2011), Empirical Research in Business Process Management (ER-BPM 2011), Event-Driven Business Process Management (edBPM 2011), Process Model Collections (PMC 2011), Process-Aware Logistics Systems (PALS 2011), Process-Oriented Systems in Heal...
This book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, held in Toronto, Canada in May 2007. The 21 revised full papers are organized in topical sections on reaching out, context and its application, security and privacy, understanding use, sensing, as well as finding and positioning.
This book constitues the refereed proceedings of the Second International Symposium on Agent Systems and Applications and the Fourth International Symposium on Mobile Agents, ASA/MA 2000 held in ZÃ1⁄4rich, Switzerland in September 2000. The 20 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on migration, security issues, systems and applications, mobile agent applications, applications of multi-agent systems, communication and mobility control, cooperation and interaction.
This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Financial Cryptography and Data Security, FC 2010, held in Tenerife, Canary Islands, Spain in January 2010. The 19 revised full papers and 15 revised short papers presented together with 1 panel report and 7 poster papers were carefully reviewed and selected from 130 submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security.
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" confer...
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- ...
New paradigms can popularize old technologies. A new \standalone" paradigm, the electronic desktop, popularized the personal computer. A new \connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in...
This book constitutes the thoroughly refereed joint post-proceedings of nine workshops held as part of the 10th International Conference on Extending Database Technology, EDBT 2006, held in Munich, Germany in March 2006. The 70 revised full papers presented were selected from numerous submissions during two rounds of reviewing and revision.
Formality is becoming accepted as essential in the development of complex systems such as multi-layer communications protocols and distributed systems. Formality is mandatory for mathematical verification, a procedure being imposed on safety-critical system development. Standard documents are also becoming increasingly formalised in order to capture notions precisely and unambiguously. This FORTE '91 proceedings volume has focussed on the standardised languages SDL, Estelle and LOTOS while, as with earlier conferences, remaining open to other notations and techniques, thus encouraging the continuous evolution of formal techniques. This useful volume contains 29 submitted papers, three invited papers, four industry reports, and four tool reports organised to correspond with the conference sessions.