Listing 1 - 9 of 9 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 28th IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on access control, privacy, networked and mobile environments, data access, cloud databases, and private retrieval.
Computer security --- Database security --- Internet --- Data protection --- Security measures --- Computer security. --- Database management. --- Information Systems. --- Computer Communication Networks. --- Systems and Data Security. --- Database Management. --- Management of Computing and Information Systems. --- Information Systems Applications (incl. Internet). --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Management information systems. --- Computer science. --- Application software. --- Computer communication systems. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Distributed processing --- Communication systems
Choose an application
This book constitutes the refereed proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2018, held in Regensburg, Germany, in September 2018 in conjunction with DEXA 2018. The 15 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: Permission models and cloud, privacy, proactive security measures, and cyber physical systems.
Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Computers and Society. --- Data Encryption. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Electronic commerce --- Business enterprises --- Management --- Computer networks --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Data Encryption. --- Information Systems. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Business enterprises --- Computer networks --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems
Choose an application
Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Infrastructure à clé publique (Sécurité informatique) --- Données --- Commerce électronique --- Entreprises --- Congresses. --- Security measures --- Computer networks --- Congrès --- Transmissions --- Sécurité --- Mesures --- Réseaux d'ordinateurs --- Computer Science --- Engineering & Applied Sciences --- Data communication systems --- Transmission of data --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Computer science. --- Information technology. --- Business --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computers and Society. --- Management of Computing and Information Systems. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- IT in Business. --- Data processing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information theory --- Telecommunication systems --- Information Systems. --- Cryptology. --- Business—Data processing. --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security)
Choose an application
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Data encryption (Computer science)
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011, held in Toulouse, France, in August/September 2011 in conjunction with DEXA 2011. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: identity and trust management; security and privacy models for pervasive information systems; reliability and security of content and data; authentication and authorization in digital business; intrusion detection and information filtering; management of privacy and confidentiality; and cryptographic protocols/usability of security.
Electronic commerce --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Security measures --- Information Technology --- Computer Science (Hardware & Networks) --- Business enterprises --- Computer security --- Computer networks --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Data Encryption. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Commerce --- Information superhighway --- Business --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security. .
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Data encryption (Computer science)
Choose an application
This two volume set of LNCS 11029 and LNCS 11030 constitutes the refereed proceedings of the 29th International Conference on Database and Expert Systems Applications, DEXA 2018, held in Regensburg, Germany, in September 2018. The 35 revised full papers presented together with 40 short papers were carefully reviewed and selected from 160 submissions. The papers of the first volume discuss a range of topics including: Big data analytics; data integrity and privacy; decision support systems; data semantics; cloud data processing; time series data; social networks; temporal and spatial databases; and graph data and road networks. The papers of the second volume discuss a range of the following topics: Information retrieval; uncertain information; data warehouses and recommender systems; data streams; information networks and algorithms; database system architecture and performance; novel database solutions; graph querying and databases; learning; emerging applications; data mining; privacy; and text processing.
Computer science. --- Data structures (Computer science). --- Algorithms. --- Database management. --- Data mining. --- Information storage and retrieval. --- Computer Science. --- Data Mining and Knowledge Discovery. --- Information Systems Applications (incl. Internet). --- Database Management. --- Information Storage and Retrieval. --- Data Structures. --- Algorithm Analysis and Problem Complexity. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Foundations --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Information storage and retrieva. --- Data structures (Computer scienc. --- Computer software. --- Data structures (Computer science) --- Software, Computer --- Database management --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This two volume set of LNCS 11029 and LNCS 11030 constitutes the refereed proceedings of the 29th International Conference on Database and Expert Systems Applications, DEXA 2018, held in Regensburg, Germany, in September 2018. The 35 revised full papers presented together with 40 short papers were carefully reviewed and selected from 160 submissions. The papers of the first volume discuss a range of topics including: Big data analytics; data integrity and privacy; decision support systems; data semantics; cloud data processing; time series data; social networks; temporal and spatial databases; and graph data and road networks. The papers of the second volume discuss a range of the following topics: Information retrieval; uncertain information; data warehouses and recommender systems; data streams; information networks and algorithms; database system architecture and performance; novel database solutions; graph querying and databases; learning; emerging applications; data mining; privacy; and text processing.
Computer science. --- Mathematical logic. --- Database management. --- Data mining. --- Information storage and retrieval. --- Artificial intelligence. --- Computer Science. --- Data Mining and Knowledge Discovery. --- Database Management. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Artificial Intelligence (incl. Robotics). --- Mathematical Logic and Formal Languages. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Informatics --- Science --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Information organization. --- Information retrieval. --- Artificial Intelligence. --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Organization of information --- Database management --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Listing 1 - 9 of 9 |
Sort by
|