You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security––ESORICS 2008––held October 6–8, 2008 in Torremolinos (Malaga), Spain, and hosted by the University of Malaga, C- puter Science Department. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in different European countries. From 2002 it has taken place yearly. It attracts an international audience from both the academic and industrial communities. In response to the call for papers, 168 papers were submitted to the symposium. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the Program Comm- tee. The Program Committee meeting was held electronically, holding intensive d- cussion over a period of two weeks. Finally, 37 papers were selected for presentation at the symposium, giving an acceptance rate of 22%.
Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly,ithas become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-- face encounters and may even oust them. Most SNS-adepts have hundreds of “friends”, happily sharing pictures and pro?les and endless chitchat. We are on the threshold of the Internet of Things, where every object will have its RFID-tag. This will not only e?ect companies, who will be able to optimize their production and delivery processes, but also end users, who will be able to enjoy many ...
This book constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS 2010, held in Gandhinagar, India, in December 2010. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 51 initial submissions. The papers are organized in topical sections on integrity and verifiability, web and data security, access control and auditing, as well as system security.
This volume contains the proceedings of the First International ICST Conference on Digital Business (DigiBiz 2009), hosted by City University London in London, UK. This annual event had the main objective to stimulate and disseminate research results and experimentation on future Digital Business to a wider multidisciplinary forum that would allow the participants to cross the boundaries between research and business. The scientific offering in e-business, e-commerce, and ICT in general is quite broad and spans many different research themes, involving several communities and me- odologies. The growth and dynamic nature of these research themes pose both ch- lenges and opportunities. The challenges are in having scientists and practitioners talk to each other: despite the fact that they work on similar problems they often use very different languages in terms of research tools and approaches. The opportunities on the other hand arise when scientists and practitioners engage in multidisciplinary d- cussions leading to new ideas, projects and products.
Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present everywhere in the form of smart and sensitive c- puting devices. They are nonintrusive, transparent a...
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.
This book constitutes the refereed and revised proceedings of the workshops and the doctoral consortium co-located with the 10th International Conference on Perspectives in Business Informatics Research (BIR), held in Riga, Latvia, in October 2011. The four workshops focused on Information Logistics and Knowledge Supply for Viable Enterprises (ILOG 2011), Alignment of Business Processes and Security Modeling (ABPSM 2011), Intelligent Educational Systems and Technology-Enhanced Learning (INTEL-EDU 2011), and User-Oriented Information Integration (UOII 2011). The two best papers from the doctoral consortium are also included.
The ever growing number of application scenarios for IT systems leads to a significant increase in their number and hence to a level of complexity that has grown tremendously in comparison with early IT installations by the mid of the past decade. In numerous attempts to integrate these diverging application stacks, various prominent methods have emerged in the past, most recently the topic of EAI which strives to achieve a consolidated view at diverse application systems. However, the emergence and rise of cloud-based services leads to new challenges to deal with. Usage of offerings from a no further specified cloud appears appealing for IT decision makers since it promises cost savings whi...
This book constitutes the refereed proceedings of the Second International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2011, held in Toulouse, France, in August/September 2011. The 30 revised full papers presented were carefully reviewed and selected from numerous submissions. Among the topics addressed are aspects of security, reliability, privacy and anonymity of e-government systems, knowledge processing, service-oriented computing, and case studies of e-government systems in several countries.
Dublin has been called the centre of the paralysis of the Universe, the second city of Empire, Scandaltown, Strumpet City, a series of accidental encounters, the largest village in Europe, the fishy home of Molly Malone, and - occasionally - the capital of Ireland. Although Dublin has had a history that encompasses a huge range of human experience, Dublines is not a conventional historical presentation of the city's fascinating character, it is more a series of pictures and a choir of voices that together form a complex portrait of the city - from its venomous wit to its instinctive warm-heartedness, from its sick congestion to the expansive visions and statements of many of its sons and da...