Listing 1 - 10 of 16 | << page >> |
Sort by
|
Choose an application
The next generation of Business Process Management (BPM) methods and tools will support the development of a new generation of service-enabled applications that change and evolve over time. The trend is moving from relatively stable, organization-specific applications to dynamic ones supporting business processes. This book is an outcome of the International Workshop on Business System Management and Engineering (BSME 2010), held in Malaga, Spain, in June/July 2010, in conjunction with the TOOLS 2010 federated conferences and under the aegis of the EU Network of Excellence on Service Software and Systems (S-Cube). The goal of the workshop was to bring together experts in the fields of business process management, service-oriented architectures, and service security to discuss the current state of research and identify new issues, challenges, and research directions. The results of these discussions are reflected in this book.
Management information systems --- Business --- Service-oriented architecture (Computer science) --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Applied Mathematics --- Computer Science --- Information Technology --- Data processing --- Service-oriented network architecture (Computer science) --- SOA (Computer science) --- SONA (Computer science) --- Computer science. --- Software engineering. --- Computer security. --- Application software. --- Management information systems. --- E-commerce. --- Computer Science. --- Computer Appl. in Administrative Data Processing. --- Information Systems Applications (incl. Internet). --- Management of Computing and Information Systems. --- e-Commerce/e-business. --- Software Engineering. --- Systems and Data Security. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Computer network architectures --- Electronic data interchange --- Information systems. --- Information Systems.
Choose an application
Cloud computing. --- Electronic data processing --- Web services --- Distributed processing
Choose an application
The Congress will cover all aspects of services computing and applications, current or emerging It covers various systems and networking research pertaining to cloud, edge and Internet of Things (IoT), as well as technologies for intelligent computing, learning, big data, 5G and blockchain applications, in addition to emerging digital health services issues ranging from nano micro services to next generation wearables, while addressing critical requirements such as high performance, security, privacy, dependability, trustworthiness, re usability, interoperability, cost effectiveness and quality of life.
Choose an application
Conference proceedings. --- Convention proceedings --- Meeting proceedings --- Proceedings of conferences --- Congresses and conventions
Choose an application
This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.
Mobile communication systems --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Systems and Data Security. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Distributed processing --- Foundations --- Protection --- Security measures --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems
Choose an application
Open Source Systems Security Certification provides an introduction to the notion of the Security Certification, including test-based and model-based approaches to the certification of software products. Several Security Certification standards are presented, including the international standard for the certification of IT products Common Criteria (ISO/IEC 15408) (CC 2006), a certification officially adopted by the governments of 18 nations. This book discusses Security Certification as a way to foster adoption and deployment of Open Source Software (OSS) in security-sensible markets, such as telecommunications, government and the military. Scientific and technical issues of OSS security certification are highlighted through case studies. This volume is designed for professionals and companies trying to implement an Open Source Systems (OSS) aware IT governance strategy, and SMEs looking for ways to use OSS in order to enter new security-conscious markets traditionally held by proprietary products. This book is also suitable for researchers and advanced-level students interested in OSS development, deployment and adoption issues.
Application software. --- Computer security. --- Mobile computing. --- Open source software. --- Open source software --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Free software (Open source software) --- Open code software --- Opensource software --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Software engineering. --- Programming languages (Electronic computers). --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Programming Languages, Compilers, Interpreters. --- Data Structures, Cryptology and Information Theory. --- Software Engineering/Programming and Operating Systems. --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Languages, Artificial --- Computer software engineering --- Engineering --- Informatics --- Science --- Computer software --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software)
Choose an application
This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2016, Ontologies, Databases, and Applications of Semantics, ODBASE 2016, and Cloud and Trusted Computing, C&TC, held as part of OTM 2016 in October 2016 in Rhodes, Greece. The 45 full papers presented together with 16 short papers were carefully reviewed and selected from 133 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, information systems, enterprise work ow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.
Computer science. --- Software engineering. --- Computer security. --- Information storage and retrieval. --- Artificial intelligence. --- Application software. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Software Engineering. --- Systems and Data Security. --- Computer Appl. in Administrative Data Processing. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Informatics --- Science --- Protection --- Security measures --- Information storage and retrieva. --- Information systems. --- Artificial Intelligence. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Distributed databases
Choose an application
This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2015, Ontologies, Databases, and Applications of Semantics, ODBASE 2015, and Cloud and Trusted Computing, C&TC, held as part of OTM 2015 in October 2015 in Rhodes, Greece. The 30 full papers presented together with 15 short papers were carefully reviewed and selected from 144 initial submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, information systems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Software engineering. --- Computer security. --- Information storage and retrieval. --- Artificial intelligence. --- Application software. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Software Engineering. --- Artificial Intelligence (incl. Robotics). --- Systems and Data Security. --- Computer Appl. in Administrative Data Processing. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Informatics --- Science --- Protection --- Security measures --- Information storage and retrieva. --- Information systems. --- Artificial Intelligence. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Distributed databases --- Web databases
Choose an application
This double volumes LNCS 10573-10574 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2017, Ontologies, Databases, and Applications of Semantics, ODBASE 2017, and Cloud and Trusted Computing, C&TC, held as part of OTM 2017 in October 2017 in Rhodes, Greece. The 61 full papers presented together with 19 short papers were carefully reviewed and selected from 180 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, information systems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.
Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data mining. --- Artificial intelligence. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Information Systems Applications (incl. Internet). --- Software Engineering. --- Systems and Data Security. --- Data Mining and Knowledge Discovery. --- Computer Communication Networks. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Computer software engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Database searching --- Data protection --- Security systems --- Hacking --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Distributed processing --- Artificial Intelligence. --- Internet --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This double volumes LNCS 10573-10574 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2017, Ontologies, Databases, and Applications of Semantics, ODBASE 2017, and Cloud and Trusted Computing, C&TC, held as part of OTM 2017 in October 2017 in Rhodes, Greece. The 61 full papers presented together with 19 short papers were carefully reviewed and selected from 180 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, information systems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.
Computer science. --- Software engineering. --- Mathematical logic. --- Database management. --- Data mining. --- Artificial intelligence. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Software Engineering. --- Information Systems Applications (incl. Internet). --- Database Management. --- Data Mining and Knowledge Discovery. --- Mathematical Logic and Formal Languages. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Computer software engineering --- Informatics --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Database searching --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Engineering --- Science --- Artificial Intelligence. --- Internet --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Listing 1 - 10 of 16 | << page >> |
Sort by
|