You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as u...
Presents theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices. Provides recent, comprehensive coverage of all issues related to information security and ethics, as well as the opportunities, future challenges, and emerging trends related to this subject.
sers: GADA, MOIS, WOSE, and INTEROP. We trust that their audiences will mutually productively and happily mingle with those of the main conferences. A special mention for 2004 is in order for the new Doctoral Symposium Workshop where three young post-doc researchers organized an original set-up and formula to bring PhD students together and allow them to submit their research proposals for selection. A limited number of the submissions and their approaches will be independently evaluated by a panel of senior experts at the conference, and presented by the students in front of a wider audience. These students also got free access to all other parts of the OTM program, and only paid a heavily ...
This book constitutes the proceedings of the 7th Joint International Conference on Service-Oriented Computing, ICSOC-ServiceWave 2009, held in Stockholm, Sweden, in November 2009. The 54 contributions to this volume, consisting of 37 full papers, 8 short papers and 9 demonstration papers, were carefully reviewed and selected from 228 submissions. The papers are arranged in topical sections on composition, discovery, design principles, customization and adaptation, negotiation, agreements and compliance, selection, platforms and infrastructures, security, modeling and design, validation and verification, reputation and ranking, and service management. This volume launches the new subline of Lecture Notes in Computer Science, entitled LNCS Services Science.
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.
st We welcome you to the proceedings of the 21 International Conference on Database and Expert Systems Applications held in Bilbao. With information and database s- tems being a central topic of computer science, it was to be expected that the integ- tion of knowledge, information and data is today contributing to the again rapidly increasing attractiveness of this field for researchers and practitioners. Since its foundation in 1990, DEXA has been an annual international conference, located in Europe, which showcases state-of-the-art research activities in these areas. DEXA 2010 continued this tradition and provided a forum for presenting and discu- ing research results in the area of datab...
Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area—including healthcare, finance, manufacturing, and marketing—could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could...
This book constitutes the refereed proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in London, UK, in July 2008. The 22 revised full papers presented together with 1 keynote lecture and 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on access control, audit and logging, privacy, systems security, certificate management, trusted computing platforms, security policies and metrics, as well as Web and pervasive systems.
This book constitutes the refereed proceedings of the 20th International Conference on Database and Expert Systems Applications, DEXA 2009, held in Linz, Austria, in August/September 2009. The 35 revised full papers and 35 short papers presented were carefully reviewed and selected from 202 submissions. The papers are organized in topical sections on XML and databases; Web, semantics and ontologies; temporal, spatial, and high dimensional databases; database and information system architecture, performance and security; query processing and optimisation; data and information integration and quality; data and information streams; data mining algorithms; data and information modelling; information retrieval and database systems; and database and information system architecture and performance.