Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
The CCIS series is devoted to the publication of peer-reviewed proceedings of conferences and workshops. Its aim is to efficiently disseminate original research results in computer science. All CCIS proceedings are available in electronic form from the SpringerLink digital library, and as printed books, and reach libraries and readers worldwide via Springer’s distribution network. Besides globally relevant meetings with internationally representative program committees guaranteeing a strict peer-reviewing and paper-selection process, conferences run by societies or of high regional or national relevance are also considered for publication. Application-oriented and interdisciplinary conferences are also welcome. The topical scope of CCIS spans the entire spectrum of computer science ranging from foundational topics in the theory of computing to information and communications science and technology and a broad variety of interdisciplinary application fields. CCIS proceedings can be published in time for distribution at conferences or as revised proceedings after the event. The publication is free of charge and an Open Access option is available at a fee. The language of publication is exclusively English. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, and Scopus. CCIS volumes are also submitted for inclusion in ISI Proceedings. To start the evaluation of your proposal for inclusion in the CCIS series, please send an e-mail to ccis@springer.com. Detailed information on CCIS can be found at http://www.springer.com/series/7899.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Database management. --- Application software. --- Computers and civilization. --- Computer Science. --- Computer Science, general. --- Systems and Data Security. --- Computers and Society. --- Computer Appl. in Administrative Data Processing. --- Database Management. --- Computer Communication Networks. --- Computer security --- Computer networks --- Internet --- Security measures --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Information systems. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- Distributed processing
Choose an application
The CCIS series is devoted to the publication of peer-reviewed proceedings of conferences and workshops. Its aim is to efficiently disseminate original research results in computer science. All CCIS proceedings are available in electronic form from the SpringerLink digital library, and as printed books, and reach libraries and readers worldwide via Springer’s distribution network. Besides globally relevant meetings with internationally representative program committees guaranteeing a strict peer-reviewing and paper-selection process, conferences run by societies or of high regional or national relevance are also considered for publication. Application-oriented and interdisciplinary conferences are also welcome. The topical scope of CCIS spans the entire spectrum of computer science ranging from foundational topics in the theory of computing to information and communications science and technology and a broad variety of interdisciplinary application fields. CCIS proceedings can be published in time for distribution at conferences or as revised proceedings after the event. The publication is free of charge and an Open Access option is available at a fee. The language of publication is exclusively English. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, and Scopus. CCIS volumes are also submitted for inclusion in ISI Proceedings. To start the evaluation of your proposal for inclusion in the CCIS series, please send an e-mail to ccis@springer.com. Detailed information on CCIS can be found at http://www.springer.com/series/7899.
Office management --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- computers --- informatica --- maatschappij --- bedrijfsadministratie --- informatiesystemen --- database management --- computerbeveiliging --- computernetwerken --- computerkunde
Choose an application
This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on security; accountability, data protection and privacy; research and innovation.
Computer science. --- Computer communication systems. --- Computer security. --- Database management. --- Application software. --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Computers and Society. --- Computer Appl. in Administrative Data Processing. --- Database Management. --- Computer Communication Networks. --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Information systems. --- Computer networks --- Computer security
Choose an application
This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies; risk and trust; research and innovation in cyber security and privacy.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Database management. --- Application software. --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Computers and Society. --- Computer Appl. in Administrative Data Processing. --- Database Management. --- Computer Communication Networks. --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Information systems. --- Computer security
Choose an application
Classes of socio-technical hazards allow a characterization of the risk in technology innovation and clarify the mechanisms underpinning emergent technological risk. Emerging Technological Risk provides an interdisciplinary account of risk in socio-technical systems including hazards which highlight: · How technological risk crosses organizational boundaries, · How technological trajectories and evolution develop from resolving tensions emerging between social aspects of organisations and technologies and · How social behaviour shapes, and is shaped by, technology. Addressing an audience from a range of academic and professional backgrounds, Emerging Technological Risk is a key source for those who wish to benefit from a detail and methodical exposure to multiple perspectives on technological risk. By providing a synthesis of recent work on risk that captures the complex mechanisms that characterize the emergence of risk in technology innovation, Emerging Technological Risk bridges contributions from many disciplines in order to sustain a fruitful debate. Emerging Technological Risk is one of a series of books developed by the Dependability Interdisciplinary Research Collaboration funded by the UK Engineering and Physical Sciences Research Council.
Computer system performance. --- Engineering. --- System safety. --- Technology. --- Technology -- Risk assessment. --- Technology_xPhilosophy. --- Engineering & Applied Sciences --- Chemical & Materials Engineering --- Mechanical Engineering --- Technology - General --- Materials Science --- Industrial & Management Engineering --- Interdisciplinary research. --- Applied science --- Arts, Useful --- Science, Applied --- Useful arts --- IDR (Research) --- Research, Interdisciplinary --- Management. --- Industrial management. --- Philosophy. --- Computer system failures. --- Quality control. --- Reliability. --- Industrial safety. --- Quality Control, Reliability, Safety and Risk. --- Innovation/Technology Management. --- System Performance and Evaluation. --- Philosophy of Technology. --- Science --- Industrial arts --- Material culture --- Transdisciplinary research --- Research --- Mental philosophy --- Humanities --- Administration --- Industrial relations --- Organization --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Prevention --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Industrial accidents --- Industries --- Job safety --- Occupational hazards, Prevention of --- Occupational health and safety --- Occupational safety and health --- Prevention of industrial accidents --- Prevention of occupational hazards --- Safety, Industrial --- Safety engineering --- Safety measures --- Safety of workers --- System safety --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Management --- Business --- Industrial organization --- Dependability --- Trustworthiness --- Conduct of life --- Factory management --- Industrial engineering --- Reliability (Engineering) --- Sampling (Statistics) --- Standardization --- Quality assurance --- Quality of products --- Failures
Choose an application
Classes of socio-technical hazards allow a characterization of the risk in technology innovation and clarify the mechanisms underpinning emergent technological risk. Emerging Technological Risk provides an interdisciplinary account of risk in socio-technical systems including hazards which highlight: · How technological risk crosses organizational boundaries, · How technological trajectories and evolution develop from resolving tensions emerging between social aspects of organisations and technologies and · How social behaviour shapes, and is shaped by, technology. Addressing an audience from a range of academic and professional backgrounds, Emerging Technological Risk is a key source for those who wish to benefit from a detail and methodical exposure to multiple perspectives on technological risk. By providing a synthesis of recent work on risk that captures the complex mechanisms that characterize the emergence of risk in technology innovation, Emerging Technological Risk bridges contributions from many disciplines in order to sustain a fruitful debate. Emerging Technological Risk is one of a series of books developed by the Dependability Interdisciplinary Research Collaboration funded by the UK Engineering and Physical Sciences Research Council.
Choose an application
This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on security; accountability, data protection and privacy; research and innovation.
Office management --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- computers --- informatica --- maatschappij --- bedrijfsadministratie --- informatiesystemen --- database management --- computerbeveiliging --- computernetwerken --- computerkunde
Choose an application
This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies; risk and trust; research and innovation in cyber security and privacy.
Office management --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- applicatiebeheer --- apps --- computers --- informatica --- maatschappij --- bedrijfsadministratie --- database management --- computerbeveiliging --- computernetwerken --- architectuur (informatica)
Choose an application
Cloud computing is a key technology that is being adopted progressively by companies and users across different application domains and industries. Yet, there are emerging issues such as security, privacy, and data protection. The First A4Cloud Summer School has been one of the first events in the area of accountability and security in the cloud. It was organized by the EU-funded A4Cloud project, in collaboration with the European projects CIRRUS, CocoCloud, CUMULUS, and SPECS. The 13 contributions included in this volume cover the state of the art and provide research insights into the following topics: accountability in the cloud; privacy and transparency in the cloud; empirical approaches for the cloud; socio-legal aspects of the cloud; cloud standards; and the accountability glossary of terms and definitions.
Computer Science. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Management of Computing and Information Systems. --- Data Encryption. --- Computers and Society. --- Computer science. --- Data encryption (Computer science). --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Chiffrement (Informatique) --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Information storage and retrieval systems --- Systèmes d'information --- Computer communication systems. --- Computers and civilization. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Distributed processing --- Cryptology. --- Application software. --- Computer networks. --- Data encryption (Computer science) --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Classes of socio-technical hazards allow a characterization of the risk in technology innovation and clarify the mechanisms underpinning emergent technological risk. Emerging Technological Risk provides an interdisciplinary account of risk in socio-technical systems including hazards which highlight: · How technological risk crosses organizational boundaries, · How technological trajectories and evolution develop from resolving tensions emerging between social aspects of organisations and technologies and · How social behaviour shapes, and is shaped by, technology. Addressing an audience from a range of academic and professional backgrounds, Emerging Technological Risk is a key source for those who wish to benefit from a detail and methodical exposure to multiple perspectives on technological risk. By providing a synthesis of recent work on risk that captures the complex mechanisms that characterize the emergence of risk in technology innovation, Emerging Technological Risk bridges contributions from many disciplines in order to sustain a fruitful debate. Emerging Technological Risk is one of a series of books developed by the Dependability Interdisciplinary Research Collaboration funded by the UK Engineering and Physical Sciences Research Council.
Listing 1 - 10 of 14 | << page >> |
Sort by
|