Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Computer systems - Reliability - Congresses --- Trust - Congresses --- Computer systems --- Trust
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Systèmes informatiques --- Confiance --- Ordinateurs --- Sécurité informatique --- Commerce électronique --- Reliability --- Congresses --- Access control --- Security measures --- Fiabilité --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer security -- Congresses. --- Computer systems -- Reliability -- Congresses. --- Computers -- Access control -- Congresses. --- Electronic books. -- local. --- Electronic commerce -- Security measures -- Congresses. --- Trust -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Trust (Psychology) --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Commerce --- Information superhighway --- Attitude (Psychology) --- Emotions
Choose an application
The European Commission emphasizes, in its Fifth Research Framework, the “. . . emerging generic dependability requirements in the information society, stemming both from the ubiquity and volume of embedded and networked systems and services as well as from the global and complex nature of large scale information and communication infrastructures, from citizens, administrations and business in terms of technologies, tools, systems, applications and services". The series of Conference on Computer Safety, Reliability, and Security (Safecomp) contributes to satisfy these requirements by reviewing the state of the art, experiences, and new trends in the relevant scientific and industrial areas. Safecomp is intended to be a platform for technology transfer among academia, industry, and research institutions, providing the opportunity for exchange of ideas, opinions, and visions among experts. This year Safecomp celebrates the 20th anniversary, its first Conference having been organized in Stuttgart by EWICS (European Workshop on Industrial Computer Systems) in 1979, and we hope these Proceedings will contribute to the celebration by supporting Safecomp aims. The Proceedings include the 25 papers that have been presented orally at the Conference and the full version of the 14 papers that have been presented as posters, all of which were selected from 76 submissions. Papers almost uniformly take up Safecomp topics, dealing with the issues of Safety Assessment and Human Factors, Verification and Validation, Design for Safety, Formal Methods, and Security.
Computer systems --- Computer security --- Reliability --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Special purpose computers. --- Software engineering. --- Operating systems (Computers). --- Computer logic. --- Management information systems. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Operating Systems. --- Logics and Meanings of Programs. --- Special Purpose and Application-Based Systems. --- Management of Computing and Information Systems. --- Logic design. --- Information Systems. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer software engineering --- Engineering --- Operating systems --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Special purpose computers --- Computer science logic --- Logic, Symbolic and mathematical --- Communication systems --- Computer systems - Reliability - Congresses --- Computer security - Congresses
Choose an application
Computers and their interactions are becoming the characteristic features of our time: Many people believe that the industrial age is going over into the information age. In the same way as life of the beginning of this century was dominated by machines, factories, streets and railways, the starting century will be characterised by computers and their networks. This change naturally affects also the institutions and the installations our lives depend upon: power plants, including nuclear ones, chemical plants, mechanically working factories, cars, railways and medical equipment; they all depend on computers and their connections. In some cases it is not human life that may be endangered by computer failure, but large investments; e. g. if a whole plant interrupts its production for a long time. In addition to loss of life and property one must not neglect public opinion, which is very critical in many countries against major technical defects. The related computer technology, its hardware, software and production process differ between standard applications and safety related ones: In the safety case it is normally not only the manufacturers and the customers that are involved, but a third party, usually an assessor, who is taking care of the public interest on behalf of a state authority. Usually safety engineers are in a better position than their colleagues from the conventional side, as they may spend more time and money on a particular task and use better equipment.
Computer systems --- Computer security --- Reliability --- Computer science. --- Special purpose computers. --- Software engineering. --- Data encryption (Computer science). --- Coding theory. --- Computer logic. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Computers and Society. --- Software Engineering/Programming and Operating Systems. --- Coding and Information Theory. --- Logics and Meanings of Programs. --- Special Purpose and Application-Based Systems. --- Congresses --- Logic design. --- Cryptology. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Data compression (Telecommunication) --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Computer software engineering --- Engineering --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information theory. --- Special purpose computers --- Computers --- Computer science logic --- Logic, Symbolic and mathematical --- Communication theory --- Communication --- Cybernetics --- Civilization and computers --- Civilization --- Computer systems - Reliability - Congresses --- Computer security - Congresses
Choose an application
Computer software --- Software architecture --- Computer systems --- Logiciels --- Systèmes informatiques --- Development --- Congresses. --- Reliability --- Développement --- Congrès --- Fiabilité --- Computer software -- Development -- Congresses. --- Computer systems -- Reliability -- Congresses. --- Electronic books. -- local. --- Software architecture -- Development -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Information Technology --- Software Engineering --- Architecture, Software --- Computer software architecture --- Architecture --- Design --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer programming. --- Programming languages (Electronic computers). --- Computer logic. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Software Engineering. --- Programming Techniques. --- Programming Languages, Compilers, Interpreters. --- Logics and Meanings of Programs. --- Computer Communication Networks. --- Computer science logic --- Logic, Symbolic and mathematical --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Programming --- Distributed processing --- Logic design. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com.
Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Systèmes informatiques --- Confiance --- Ordinateurs --- Sécurité informatique --- Commerce électronique --- Reliability --- Congresses. --- Access control --- Security measures --- Fiabilité --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer systems -- Reliability -- Congresses. --- Trust -- Management -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Management --- Trust (Psychology) --- Computer science. --- Computer security. --- Data structures (Computer science). --- Computers. --- Law and legislation. --- Computer Science. --- Theory of Computation. --- Computer Science, general. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- Legal Aspects of Computing. --- Attitude (Psychology) --- Emotions --- Information theory. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cyberspace --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication theory --- Communication --- Cybernetics --- Law and legislation --- Protection --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Machine theory --- Calculators --- Data protection. --- Information technology --- Data and Information Security. --- Technology and law --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Choose an application
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on social aspects and usability, trust reasoning and processing, data security, enhancements to subjective logic, information sharing, risk assessment, and simulation of trust and reputation systems.
Computer systems -- Reliability -- Congresses. --- Trust -- Management -- Congresses. --- Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Computer Science --- Engineering & Applied Sciences --- Reliability --- Access control --- Security measures --- Management --- Trust (Psychology) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Application software. --- E-commerce. --- Computer Science. --- Computer Applications. --- Coding and Information Theory. --- Data Encryption. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- e-Commerce/e-business. --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Attitude (Psychology) --- Emotions --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
iTrust is an Information Society Technologies (IST) working group, which started on 1st of August, 2002. The working group is being funded as a concerted action/ thematic network by the Future and Emerging Technologies (FET) unit of the IST program. The aim of iTrust is to provide a forum for cross-disciplinary investigation of the application of trust as a means of establishing security and con?dence in the global computing infrastructure, recognizing trust as a crucial enabler for meaningful and mutually bene?cial interactions. The proposed forum is intended to bring together researchers with a keen interest in complementary aspects of trust, from technology-oriented disciplines and the ?elds of law, social sciences, and philosophy. Hence providing the c- sortium participants (and the research communities associated with them) with the common background necessary for advancing toward an in-depth underst- ding of the fundamental issues and challenges in the area of trust management in open systems. Broadly the initiative aims to: – facilitate the cross-disciplinary investigation of fundamental issues underp- ning computational trust models by bringing together expertise from te- nology oriented sciences, law, philosophy, and social sciences – facilitate the emergence of widely acceptable trust management processes for dynamic open systems and applications – facilitate the development of new paradigms in the area of dynamic open systems which e?ectively utilize computational trust models – help the incorporation of trust management elements in existing standards.
Computer systems --- Trust --- Reliability --- Trust (Psychology) --- Computer science. --- Computer communication systems. --- Software engineering. --- Information storage and retrieval. --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Information Storage and Retrieval. --- Artificial Intelligence (incl. Robotics). --- Computers and Society. --- Attitude (Psychology) --- Emotions --- Information storage and retrieva. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer software engineering --- Engineering --- Informatics --- Science --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Distributed processing --- Computer systems - Reliability - Congresses --- Trust - Congresses
Listing 1 - 8 of 8 |
Sort by
|