Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- bedrijfseconomie --- DES (data encryption standard) --- informatica --- maatschappij --- informatica management --- OS (operating system) --- computernetwerken
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- bedrijfseconomie --- DES (data encryption standard) --- informatica --- maatschappij --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
The annual international conference on Database and Expert Systems Applications (DEXA) is now well established as a reference scientific event. The reader will find in this volume a collection of scientific papers that represent the state of the art of - search in the domain of data, information and knowledge management, intelligent systems, and their applications. The 18th instance of the series of DEXA conferences was held at the University of Regensburg, Germany, September 3-7, 2007. Several collocated conferences and workshops covered specialized and comp- mentary topics to the main conference topic. Six conferences the Eighth Inter- tional Conference on Data Warehousing and Knowledge Discovery (DaWaK), the Seventh International Conference on Electronic Commerce and Web Technologies (EC-Web), the Fifth International Conference on Electronic Government (EGOV), the 3rd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus), the 3rd International Conference on Industrial Applications of Holonic and Multi-Agent Systems (HoloMAS), and the 1st International Conference on N- work-Based Information Systems (NBiS) and 19 workshops were collocated with DEXA. The conference is a unique international event with a balanced depth and breadth of topics. Its much appreciated conviviality fosters unmatched opportunities to meet, share the latest scientific results and discuss the latest technological advances in the area of information technologies with young scientists and engineers as well as senior world-renown experts.
Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- bedrijfseconomie --- informatica --- informatiesystemen --- database management --- KI (kunstmatige intelligentie) --- informatica management --- robots --- AI (artificiële intelligentie)
Choose an application
Applied marketing --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- bedrijfseconomie --- DES (data encryption standard) --- e-business --- informatica --- e-commerce --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- informatiesystemen --- informatica management --- computernetwerken
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- cloud computing --- computers --- informatica --- informatiesystemen --- computerbeveiliging --- informatica management --- computerkunde
Choose an application
Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Infrastructure à clé publique (Sécurité informatique) --- Données --- Commerce électronique --- Entreprises --- Congresses. --- Security measures --- Computer networks --- Congrès --- Transmissions --- Sécurité --- Mesures --- Réseaux d'ordinateurs --- Computer Science --- Engineering & Applied Sciences --- Data communication systems --- Transmission of data --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Computer science. --- Information technology. --- Business --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computers and Society. --- Management of Computing and Information Systems. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- IT in Business. --- Data processing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information theory --- Telecommunication systems --- Information Systems. --- Cryptology. --- Business—Data processing. --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security)
Choose an application
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Data encryption (Computer science)
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011, held in Toulouse, France, in August/September 2011 in conjunction with DEXA 2011. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: identity and trust management; security and privacy models for pervasive information systems; reliability and security of content and data; authentication and authorization in digital business; intrusion detection and information filtering; management of privacy and confidentiality; and cryptographic protocols/usability of security.
Electronic commerce --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Security measures --- Information Technology --- Computer Science (Hardware & Networks) --- Business enterprises --- Computer security --- Computer networks --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Data Encryption. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Commerce --- Information superhighway --- Business --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software