You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 20th Annual Working Conference on Data and Applications Security held in Sophia Antipolis, France, in July/August 2006. The 22 revised full papers presented were carefully reviewed and selected from 56 submissions. The papers explore theory, technique, applications, and practical experience of data and application security covering a number of diverse research topics such as access control, privacy, and identity management.
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in hardware and software and in computer theory, design, and applications. It has also provided contributorswith a medium in which they can examine their subjects in greater depth and breadth than that allowed by standard journal articles. As a result, many articles have become standard references that continue to be of significant, lasting value despite the rapid growth taking place in the field.
This book constitutes the refereed proceedings of the five workshops that were organized in conjunction with the International Conference on Business Information Systems, BIS 2015, which took place in Poznan, Poland, in June 2015. The 26 papers in this volume were carefully reviewed and selected from 56 submissions and were revised and extended after the event. The workshop topics covered knowledge-based business information systems (AKTB), business and IT alignment (BITA), transparency-enhancing technologies and privacy dashboards (PTDCS), semantics usage in enterprises (FSFE), and issues related to DBpedia. In addition two keynote papers are included in this book.
The 3rd Eastern European Conference on Advances in Databases and Information Systems (ADBIS’99) took place on 13-16- September 1999, in Maribor, Slovenia. It was organized in cooperation with ACM SIGMOD, the Moscow chapter of ACM SIGMOD, Slovenian Society Informatika, and the Slovenian Ministry of Technology. The aim of the ADBIS series of conferences is to provide a forum for the exchange of scientific achievements and experiences using innovative methods and approaches between the research communities of Central and Eastern Europe and the rest of the world in the area of databases and information systems. The 1999 conference continues the series of ADBIS events held in Moscow, St. Peters...
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research ...
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20–23. The call for papers went out with the challenging motto of “Security & Privacy Silver Linings in the Cloud” build...
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18–20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long history. This volume contains the papers selected for presentation at SEC 2009. In response to the ca...
This book constitutes the refereed proceedings of nine international workshops held in Beijing, China, in conjunction with the 11th International Conference on Business Process Management, BPM 2013, in August 2013. The nine workshops comprised Business Process Intelligence (BPI 2013), Business Process Management and Social Software (BPMS2 2013), Data- and Artifact-Centric BPM (DAB 2013), Decision Mining and Modeling for Business Processes (DeMiMoP 2013), Emerging Topics in Business Process Management (ETBPM 2013), Process-Aware Logistics Systems (PALS 2013), Process Model Collections: Management and Reuse (PMC-MR 2013), Security in Business Processes (SBP 2013) and Theory and Applications of Process Visualization (TAProViz 2013). The 38 revised full papers presented were carefully reviewed and selected from 74 submissions.
This book constitutes the refereed proceedings of ten international workshops held in Eindhoven, The Netherlands, in conjunction with the 12th International Conference on Business Process Management, BPM 2014, in September 2014. The ten workshops comprised Process-oriented Information Systems in Healthcare (ProHealth 2014), Security in Business Processes (SBP 2014), Process Model Collections: Management and Reuse (PMC-MR 2014), Business Processes in Collective Adaptive Systems (BPCAS 2014), Data- and Artifact-centric BPM (DAB 2014), Business Process Intelligence (BPI 2014), Business Process Management in the Cloud (BPMC 2014), Theory and Applications of Process Visualization (TaProViz 2014), Business Process Management and Social Software (BPMS2 2014) and Decision Mining and Modeling for Business Processes (DeMiMoP 2014). The 38 revised full and eight short papers presented were carefully reviewed and selected from 84 submissions. In addition, six short papers resulting from the Doctoral Consortium at BPM 2014 are included in this book.