You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Formal Aspects of Security, FASec 2002, held in London, UK, in December 2002. The 11 revised full papers presented together with 7 invited contributions were carefully reviewed, selected, and improved for inclusion in the book. The papers are organized in topical sections on protocol verification, analysis of protocols, security modelling and reasoning, and intrusion detection systems and liveness.
This book constitutes the refereed proceedings of the 5th International Conference on Formal Engineering Methods, ICFEM 2003, held in Singapore in November 2003. The 34 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on testing and validation, state diagrams, PVS/HOL, refinement, hybrid systems, Z/Object-Z, Petri nets, timed automata, system modelling and checking, and semantics and synthesis.
This volume constitutes the refereed proceedings of ten international workshops, OTM Academy, Industry Case Studies Program, EI2N, INBAST, Meta4eS, OnToContent, ORM, SeDeS, SINCOM and SOMOCO 2012, held as part of OTM 2012 in Rome, Italy, in September 2012. The 66 revised full papers presented were carefully reviewed and selected from a total of 127 submissions. The volume also includes 7 papers from the On the Move Academy (OTMA) 2012 as well as 4 CoopIS 2012 poster papers and 5 ODBASE 2012 poster papers. The paper cover various aspects of computer supported cooperative work (CSCW), middleware, Internet/Web data management, electronic commerce, enterprise modelling, workflow management, knowledge flow, agent technologies, information retrieval, software architectures, service-oriented computing, and cloud computing.
This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised full papers and 4 revised short papers are presented together with 1 keynote paper and 7 trust management tool and systems demonstration reports. Besides technical issues in distributed computing and open systems, topics from law, social sciences, business, and philosophy are addressed.
The two-volume set LNCS 7565 and 7566 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2012), Distributed Objects and Applications - Secure Virtual Infrastructures (DOA-SVI 2012), and Ontologies, DataBases and Applications of SEmantics (ODBASE 2012) held as part of OTM 2012 in September 2012 in Rome, Italy. The 53 revised full papers presented were carefully reviewed and selected from a total of 169 submissions. The 22 full papers included in the first volume constitute the proceedings of CoopIS 2012 and are organized in topical sections on business process design; process verification and analysis; service-oriented architectures and cloud; security, risk, and prediction; discovery and detection; collaboration; and 5 short papers.
Formal methods are coming of age. Mathematical techniques and tools are now regarded as an important part of the development process in a wide range of industrial and governmental organisations. A transfer of technology into the mainstream of systems development is slowly, but surely, taking place. FM’99, the First World Congress on Formal Methods in the Development of Computing Systems, is a result, and a measure, of this new-found maturity. It brings an impressive array of industrial and applications-oriented papers that show how formal methods have been used to tackle real problems. These proceedings are a record of the technical symposium ofFM’99:alo- side the papers describingapplic...
What are the best practices for leading a workforce in which human employees have merged cognitively and physically with electronic information systems and work alongside social robots, artificial life-forms, and self-aware networks that are ‘colleagues’ rather than simply ‘tools’? How does one manage organizational structures and activities that span actual and virtual worlds? How are the forces of technological posthumanization transforming the theory and practice of management? This volume explores the reality that an organization’s workers, managers, customers, and other stakeholders increasingly comprise a complex network of human agents, artificial agents, and hybrid human-sy...
This book develops new insights into the evolving nature of organizations by applying the methodologies of posthumanist thought to the fields of organizational theory and management. An emerging 'organizational posthumanism' is described that makes sense of the ways in which forces of technological posthumanization are reshaping the members, personnel structures, information systems, processes, physical and virtual spaces, and external environments available for use by organizations. Conceptual frameworks and analytic tools are formulated that diagnose the convergence in the capacities of human and artificial actors generated by new technologies relating to human augmentation, synthetic agency, and digital-physical ecosystems. As the first systematic study of these topics, this text will interest scholars and students of organizational management and management practitioners who grapple on a daily basis with the forces of technologization that are increasingly powerful drivers of organizational change.
In 2007 the IS wo- shop (Information Security) was added to try covering also the speci?c issues of security in complex Internet-based information systems.
This book constitutes the refereed proceedings of the 8th European Symposium on Research in Computer Security, ESORICS 2003, held in Gjovik, Norway in October 2003. The 19 revised full papers presented were carefully reviewed and selected from 114 submissions. Among the topics addressed are signature control, access control, key exchange, broadcast protocols, privacy preserving technologies, attack analysis, electronic voting, identity control, authentication, security services, smart card security, formal security protocols analysis, and intrusion detection.