Listing 1 - 10 of 31 | << page >> |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 28th IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on access control, privacy, networked and mobile environments, data access, cloud databases, and private retrieval.
Computer security --- Database security --- Internet --- Data protection --- Security measures --- Computer security. --- Database management. --- Information Systems. --- Computer Communication Networks. --- Systems and Data Security. --- Database Management. --- Management of Computing and Information Systems. --- Information Systems Applications (incl. Internet). --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Management information systems. --- Computer science. --- Application software. --- Computer communication systems. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Distributed processing --- Communication systems
Choose an application
This book constitutes the refereed proceedings of the 28th IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on access control, privacy, networked and mobile environments, data access, cloud databases, and private retrieval.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- cloud computing --- mobiele netwerken --- computers --- informatica --- informatiesystemen --- database management --- computerbeveiliging --- informatica management --- computernetwerken --- computerkunde
Choose an application
Choose an application
Choose an application
Choose an application
681.3*H2 --- 681.3*H1 --- 681.3*H52 --- Database design --- Entity-relationship modeling --- 681.3*H33 --- 681.3*H4 --- EAR modeling --- Entity-attribute-relationship modeling --- ER modeling --- Information modeling --- Data base design --- System design --- Database management: security; integrity; protection--See also {?681.5*E5} --- Models and principles (Information systems) --- Information interfaces and presentation: user interfaces, input devices, input strategies, user interface management systems --- Information search and retrieval: clustering; query formulation; retrieval models; search process; selection process --- Information systems applications (GIS etc.) --- 681.3*H33 Information search and retrieval: clustering; query formulation; retrieval models; search process; selection process --- 681.3*H4 Information systems applications (GIS etc.) --- 681.3*H52 Information interfaces and presentation: user interfaces, input devices, input strategies, user interface management systems --- 681.3*H1 Models and principles (Information systems) --- 681.3*H2 Database management: security; integrity; protection--See also {?681.5*E5} --- Congresses --- Relational databases --- Data base design - Congresses. --- Relational data bases - Congresses.
Choose an application
Programming --- Information systems --- Computer. Automation --- IR (information retrieval) --- computerbesturingssystemen --- programmeren (informatica) --- database management --- software engineering
Choose an application
Sincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held from August 30th to September 1st, 2004. This conference was an outgrowth of the two successful TrustBus inter- tional workshops, held in 2002 and 2003 in conjunction with the DEXA conferences in Aix-en-Provence and in Prague. Being the first of a planned series of successful conferences it was our goal that this event would initiate a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust and privacy in digital business. We thank you all the attendees for coming to Zaragoza to participate and debate the new emerging advances in this area. The conference program consisted of one invited talk and nine regular technical papers sessions. The invited talk and keynote speech was delivered by Ahmed Patel from the Computer Networks and Distributed Systems Research Group, University College Dublin, Ireland on “Developing Secure, Trusted and Auditable Services for E-Business: An Autonomic Computing Approach”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control - sues to electronic voting, from trust and protocols to digital rights management. The conference attracted close to 100 submissions of which the program committee - cepted 29 papers for presentation and inclusion in the conference proceedings.
Computer security --- Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Security measures --- Computer networks --- Computer science. --- Computer Communication Networks. --- Operating systems (Computers). --- Data encryption (Computer science). --- Information Systems. --- Management information systems. --- Computer Science. --- Computers and Society. --- Operating Systems. --- Data Encryption. --- Management of Computing and Information Systems. --- Business Information Systems. --- Computer Science --- Engineering & Applied Sciences --- Public key infrastructure (Computer networks) --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Data communication systems --- Transmission of data --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Business. --- Management science. --- Computer communication systems. --- Computers and civilization. --- Business and Management. --- Business and Management, general. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Quantitative business analysis --- Problem solving --- Operations research --- Statistical decision --- Trade --- Economics --- Commerce --- Industrial management --- Communication systems --- Operating systems --- Distributed processing --- Business --- Information superhighway --- Information theory --- Telecommunication systems --- Cryptology. --- Computer networks. --- Operating systems (Computers) --- Data encryption (Computer science)
Choose an application
We welcome you to the Second International Conference on E commerce and Web Technology (ECWEB 2001) held in conjunction with DEXA 2001 in Munich, Germany. This conference, now in its second year, is a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art in E commerce and web technology and explore new ideas. We thank you all for coming to Munich to participate and debate the new emerging advances in this area. The research presentation and discussion during the conference will help to exchange new ideas among the researchers, developers, and practitioners. The conference program consists of an invited talk by Hannes Werthner, University of Trento, Italy, as well as the technical sessions. The regular sessions cover topics from XML Transformations and Web Development to User Behavior and Case Studies. The workshop has attracted more than 80 papers and each paper has been reviewed by at least 3 program committee members for its merit. The program committee have selected 31 papers for presentation. We would like to express our thanks to the people who helped put together the technical program: the program committee members and external reviewers for their timely and rigorous reviews of the papers, the DEXA organizing committee for their help in administrative work and support, and special thanks to Gabriela Wagner for always responding promptly.
Electronic commerce --- Software engineering --- Internet --- World Wide Web --- Telecommunications --- Marketing & Sales --- Commerce --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Business & Economics --- Computer science. --- Computer communication systems. --- Information storage and retrieval. --- Computers and civilization. --- Computer engineering. --- Computer Science. --- Computer Communication Networks. --- Popular Computer Science. --- Computer Engineering. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Computers and Society. --- Information storage and retrieva. --- Informatics --- Science --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Design and construction --- Distributed processing --- Electronic commerce - Congresses --- Software engineering - Congresses --- Internet - Congresses --- World Wide Web - Congresses --- Computer networks.
Choose an application
This book constitutes the refereed proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2018, held in Regensburg, Germany, in September 2018 in conjunction with DEXA 2018. The 15 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: Permission models and cloud, privacy, proactive security measures, and cyber physical systems.
Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Computers and Society. --- Data Encryption. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Electronic commerce --- Business enterprises --- Management --- Computer networks --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Listing 1 - 10 of 31 | << page >> |
Sort by
|