You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application logic encapsulated by Web services. Web services could be considered the best-known and most standardized technology in use today for distributed computing over the Internet. This book is the second installment of a two-book collection covering the state-of-the-art of both theoretical and practical aspects of Web services and SOC research and deployments...
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.
This timely book investigates emerging efforts to govern artificial intelligence (AI) at an international level. It aptly emphasizes the complex interactions involved when creating international laws, exploring potential and current developments in AI regulation.
This volume LNCS-IFIP constitutes the refereed proceedings of the 7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023 in Benevento, Italy, during August 28 – September 1, 2023. The 18 full papers presented together were carefully reviewed and selected from 30 submissions. The conference focuses on integrative machine learning approach, considering the importance of data science and visualization for the algorithmic pipeline with a strong emphasis on privacy, data protection, safety and security.
The two-volume set LNCS 7565 and 7566 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2012), Distributed Objects and Applications - Secure Virtual Infrastructures (DOA-SVI 2012), and Ontologies, DataBases and Applications of SEmantics (ODBASE 2012) held as part of OTM 2012 in September 2012 in Rome, Italy. The 53 revised full papers presented were carefully reviewed and selected from a total of 169 submissions. The 22 full papers included in the first volume constitute the proceedings of CoopIS 2012 and are organized in topical sections on business process design; process verification and analysis; service-oriented architectures and cloud; security, risk, and prediction; discovery and detection; collaboration; and 5 short papers.
This book constitutes the thoroughly refereed, selected papers on Cyber Security and Privacy EU Forum 2013, held in Belgium, in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on cloud computing, security and privacy management, security and privacy technology, security and privacy policy.
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.
The power of modelization in physics and in engineering is not in doubt, while in the biotechnological field many theoretical studies stop at the description level. It is time for theoretical modelization to enter the field of biotechnology, and that needs people with both physical and biological knowledge.This book introduces interested scientists with varied backgrounds to active research in different areas broadly related to what has come to be called ?dynamical modeling in biology?.
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.