Listing 1 - 10 of 30 | << page >> |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 28th IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on access control, privacy, networked and mobile environments, data access, cloud databases, and private retrieval.
Computer security --- Database security --- Internet --- Data protection --- Security measures --- Computer security. --- Database management. --- Information Systems. --- Computer Communication Networks. --- Systems and Data Security. --- Database Management. --- Management of Computing and Information Systems. --- Information Systems Applications (incl. Internet). --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Management information systems. --- Computer science. --- Application software. --- Computer communication systems. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Distributed processing --- Communication systems
Choose an application
This book constitutes the refereed proceedings of the 28th IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on access control, privacy, networked and mobile environments, data access, cloud databases, and private retrieval.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- cloud computing --- mobiele netwerken --- computers --- informatica --- informatiesystemen --- database management --- computerbeveiliging --- informatica management --- computernetwerken --- computerkunde
Choose an application
Choose an application
Choose an application
Programming --- Information systems --- Computer. Automation --- IR (information retrieval) --- computerbesturingssystemen --- programmeren (informatica) --- database management --- software engineering
Choose an application
Sincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held from August 30th to September 1st, 2004. This conference was an outgrowth of the two successful TrustBus inter- tional workshops, held in 2002 and 2003 in conjunction with the DEXA conferences in Aix-en-Provence and in Prague. Being the first of a planned series of successful conferences it was our goal that this event would initiate a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust and privacy in digital business. We thank you all the attendees for coming to Zaragoza to participate and debate the new emerging advances in this area. The conference program consisted of one invited talk and nine regular technical papers sessions. The invited talk and keynote speech was delivered by Ahmed Patel from the Computer Networks and Distributed Systems Research Group, University College Dublin, Ireland on “Developing Secure, Trusted and Auditable Services for E-Business: An Autonomic Computing Approach”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control - sues to electronic voting, from trust and protocols to digital rights management. The conference attracted close to 100 submissions of which the program committee - cepted 29 papers for presentation and inclusion in the conference proceedings.
Computer security --- Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Security measures --- Computer networks --- Computer science. --- Computer Communication Networks. --- Operating systems (Computers). --- Data encryption (Computer science). --- Information Systems. --- Management information systems. --- Computer Science. --- Computers and Society. --- Operating Systems. --- Data Encryption. --- Management of Computing and Information Systems. --- Business Information Systems. --- Computer Science --- Engineering & Applied Sciences --- Public key infrastructure (Computer networks) --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Data communication systems --- Transmission of data --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Business. --- Management science. --- Computer communication systems. --- Computers and civilization. --- Business and Management. --- Business and Management, general. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Quantitative business analysis --- Problem solving --- Operations research --- Statistical decision --- Trade --- Economics --- Commerce --- Industrial management --- Communication systems --- Operating systems --- Distributed processing --- Business --- Information superhighway --- Information theory --- Telecommunication systems --- Cryptology.
Choose an application
We welcome you to the Second International Conference on E commerce and Web Technology (ECWEB 2001) held in conjunction with DEXA 2001 in Munich, Germany. This conference, now in its second year, is a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art in E commerce and web technology and explore new ideas. We thank you all for coming to Munich to participate and debate the new emerging advances in this area. The research presentation and discussion during the conference will help to exchange new ideas among the researchers, developers, and practitioners. The conference program consists of an invited talk by Hannes Werthner, University of Trento, Italy, as well as the technical sessions. The regular sessions cover topics from XML Transformations and Web Development to User Behavior and Case Studies. The workshop has attracted more than 80 papers and each paper has been reviewed by at least 3 program committee members for its merit. The program committee have selected 31 papers for presentation. We would like to express our thanks to the people who helped put together the technical program: the program committee members and external reviewers for their timely and rigorous reviews of the papers, the DEXA organizing committee for their help in administrative work and support, and special thanks to Gabriela Wagner for always responding promptly.
Electronic commerce --- Software engineering --- Internet --- World Wide Web --- Telecommunications --- Marketing & Sales --- Commerce --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Business & Economics --- Computer science. --- Computer communication systems. --- Information storage and retrieval. --- Computers and civilization. --- Computer engineering. --- Computer Science. --- Computer Communication Networks. --- Popular Computer Science. --- Computer Engineering. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Computers and Society. --- Information storage and retrieva. --- Informatics --- Science --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Design and construction --- Distributed processing --- Electronic commerce - Congresses --- Software engineering - Congresses --- Internet - Congresses --- World Wide Web - Congresses
Choose an application
This book constitutes the refereed proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2018, held in Regensburg, Germany, in September 2018 in conjunction with DEXA 2018. The 15 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: Permission models and cloud, privacy, proactive security measures, and cyber physical systems.
Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Computers and Society. --- Data Encryption. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Electronic commerce --- Business enterprises --- Management --- Computer networks --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Data Encryption. --- Information Systems. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Business enterprises --- Computer networks --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- bedrijfseconomie --- DES (data encryption standard) --- informatica --- maatschappij --- informatica management --- OS (operating system) --- computernetwerken
Listing 1 - 10 of 30 | << page >> |
Sort by
|