You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This book investigates various definitions of trust and their characteristics in distributed systems and digital computing, and details how to model and implement trust in a digital system"--Provided by publisher.
Information technology in the workplace is vital to the management of workflow in the company; therefore, IT security is no longer considered a technical issue but a necessity of an entire corporation. The practice of IT security has rapidly expanded to an aspect of Corporate Governance so that the understanding of the risks and prospects of IT security are being properly managed at an executive level. IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best practices, and new trends in IT Security Governance. With theoretical and practical perspectives, the book aims to address IT Security Governance implementation in corporate organizations. This collection of works serves as a reference for CEOs and CIOs, security managers, systems specialists, computer science students, and much more.
This book is an in-depth exploration of blockchain and smart contracts technologies, systematically addressing their theoretical foundations while highlighting concrete applications in several key sectors. It begins by defining the fundamentals of blockchain and smart contracts, then ventures into the legal domain, analyzing the implications of automated contracts from both backend and frontend perspectives. A particular focus is placed on a sustainable design for cryptocurrencies, anticipating the principles and expectations of the future. The book then provides a detailed taxonomy of blockchain's financial applications, while also examining its role in managing scientific workflows. The fa...
This book provides an essential compilation of relevant and cutting edge academic and industry work on key Blockchain topics. This book concentrates on a wide range of advances related to Blockchains which include, among others, Blockchain principles, architecture and concepts with emphasis on key and innovative theories, methodologies, schemes and technologies of Blockchain, Blockchain platforms and architecture, Blockchain protocols, sensors and devices for Blockchain, Blockchain foundations, and reliability analysis of Blockchain-based systems. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity application experts in the listed fields and edited by prominent cybersecurity applications researchers and specialists.
This book constitutes the refereed proceedings of the 11th International Joint Conference on E-Business and Telecommunications, ICETE 2014, held in Vienna, Austria, in August 2014. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 27 full papers presented were carefully reviewed and selected from 328 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems.
This book collects 43 regular papers received from 18 countries that present innovative advances in intelligent and distributed computing, encompassing both architectural and algorithmic results related to these fields. Significant attention is given to new models, techniques, and applications for distributed intelligent architectures and high-performance architectures, machine learning techniques, Internet of Things, blockchain, intelligent transport systems, data analytics, trust and reputation systems, and many others. The book includes the peer-reviewed proceedings of the 14th International Symposium on Intelligent Distributed Computing (IDC 2021), which was held in online mode due to the COVSARS2 pandemic situation, during September 16–18, 2021. The IDC 2021 event included sessions on Internet of Things, data analytics, machine learning, multi-agent systems, algorithms, future intelligent transport solutions, blockchain, intelligent distributed computing for cyber-physical security, and security and trust and reputation in intelligent environments.
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.
This book constitutes the refereed proceedings of the 16th International Conference on Distributed Computing, DISC 2002, held in Toulouse, France, in October 2002. The 24 revised full papers presented were carefully reviewed and selected from 76 submissions. Among the issues addressed are broadcasting, secure computation, view maintenance, communication protocols, distributed agreement, self-stabilizing algorithms, message-passing systems, dynamic networks, condition monitoring systems, shared memory computing, Byzantine processes, routing, failure detection, compare-and-swap operations, cooperative computation, and consensus algorithms.