You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The unusual format of a series of discussions among a logician, a computer scientist, a philosopher and some researchers from other disciplines encourages the reader to develop his own point of view. --Book Jacket.
This book constitutes the refereed proceedings of the Third International Conference on Computability in Europe, CiE 2007, held in Sienna, Italy, in June 2007. The 50 revised full papers presented together with 36 invited papers were carefully reviewed and selected from 167 submissions.
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000.
One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled wo...
The contemporary electoral process is, in many ways, far more complex than it used to be. This book focuses on the growing involvement of non-party actors in the process of selecting candidates, as well as involvement during the campaign itself. These actors - interest groups, individual citizens, even certain political institutions - operate in the campaign environment independently of the parties and their candidates. They are not seeking to attain public office, nevertheless they interfere in the electoral process in growing numbers and with increasing intensity. For the most part, they seek to influence electoral outcomes to their advantage, and yet on occasions for less selfish reasons such as increasing the quality of the electoral process itself. Encompassing a broad range of countries - including several old democracies (the US, Germany, Britain, Norway, Denmark, Belgium, Israel, and others) and one new democracy (Romania) - and combining extensive surveys with detailed case studies of recent elections, the chapters in this volume take stock of this new feature in the contemporary electoral process, along with its origins, forms, and consequences.
This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn’s 80th birthday. The title of this books leans on the title of a serious history of cryptology named “The Codebreakers”, written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology – past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols.