You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In today’s globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to impr...
This book constitutes the refereed proceedings of the 10th International Conference on Trust and Privacy in Digital Business, TrustBus 2013, held in Prague, Czech Republic, in August 2013 in conjunction with DEXA 2013. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: access control and authentication; identity and trust management; privacy and confidentiality management; information systems security; security policies/legal issues; and trust and privacy in mobile and pervasive environments.
eHealth 2008, the First International Conference on Electronic healthcare for the twenty-first century, was held in City University, London, during September 8–9, 2008. The conference was organized as a meeting point for telecare product vendors, policy makers, government ministers, academics, clinicians and all those involved in electronic and mobile health, to examine and to share ideas contributing to the - vancement of electronic healthcare into the twenty-first century. The conference had a huge success with a large number of paper submissions. Ninety-seven papers were submitted, of which 32 were selected for presentation. Each paper was carefully reviewed blindly by a minimum of three referees from the resp- tive field. A special thanks should go to the Technical Program Committee for their hard and efficient work in the review process. In addition to the submitted contributions, the conference included a business pres- tation track with 12 invited talks by key people in the world of eHealth. The business presentation track was chaired by Sir Jonathan Michael (Deputy Director, BT Health). The success of this conference is to be credited to the contribution of many people.
This book features high-quality papers presented at the International Conference on Computational Intelligence and Informatics (ICCII 2018), which was held on 28–29 December 2018 at the Department of Computer Science and Engineering, JNTUH College of Engineering, Hyderabad, India. The papers focus on topics such as data mining, wireless sensor networks, parallel computing, image processing, network security, MANETS, natural language processing and Internet of things.
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: • Network and Wireless N...
This book constitutes the joint refereed proceedings of the 5th International Workshop on Quality of Future Internet Services, QofIS 2004, the First International Workshop on Qos Routing, WOoSR 2004, and the 4th International Workshop on Internet Charging and Qos Technology, ICQT 2004, held in Barcelona, Spain, in September/October 2004. The 38 revised full papers presented were carefully reviewed and selected from a total of around 140 submissions. The papers are organized in topical sections on Internet applications, local area and ad-hoc wireless networks, service differentiation and congestion control, traffic engineering and routing, enforcing mobility, algorithms and scalability for service routing, novel ideas and protocol enhancements, auctions and game theory, charging in mobile networks, and QoS provisioning and monitoring.
It is my great pleasure to introduce this special issue of LNSV comprising the sci- tific publications presented at ehealth 2009: The second Congress on Electronic Healthcare for the 21st Century, which took place in Istanbul, Turkey during September 23–25, 2009. Building on the first ehealth 2008 congress held in London, UK, the key topic of ehealth 2009 was investigating a realistic potential of the Internet in providing e- dence-based healthcare information and education to patients and global users. The proudly defined aim of ehealth 2009 –– bringing together the three medical sectors: academia, industry and global healthcare institutions –– was met and made the c- gress a trul...
Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.
This three volume book contains the Proceedings of 5th International Conference on Advanced Computing, Networking and Informatics (ICACNI 2017). The book focuses on the recent advancement of the broad areas of advanced computing, networking and informatics. It also includes novel approaches devised by researchers from across the globe. This book brings together academic scientists, professors, research scholars and students to share and disseminate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice.
This two-volume set, CCIS 0269-CCIS 0270, constitutes the refereed post-conference proceedings of the International Conference on Global Trends in Computing and Communication, ObCom 2011, held in Vellore, India, in December 2011. The 173 full papers presented together with a keynote paper and invited papers were carefully reviewed and selected from 842 submissions. The conference addresses all current issues associated with computing, communication and information. The proceedings consists of invited papers dealing with the review of performance models of computer and communication systems and contributed papers that feature topics such as networking, cloud computing, fuzzy logic, mobile communication, image processing, navigation systems, biometrics and Web services covering literally all the vital areas of the computing domains.