You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book takes a look at fully automated, autonomous vehicles and discusses many open questions: How can autonomous vehicles be integrated into the current transportation system with diverse users and human drivers? Where do automated vehicles fall under current legal frameworks? What risks are associated with automation and how will society respond to these risks? How will the marketplace react to automated vehicles and what changes may be necessary for companies? Experts from Germany and the United States define key societal, engineering, and mobility issues related to the automation of vehicles. They discuss the decisions programmers of automated vehicles must make to enable vehicles to ...
Building the E-Service Society is a state-of-the-art book which deals with innovative trends in communication systems, information processing, and security and trust in electronic commerce, electronic business, and electronic government. It comprises the proceedings of I3E2004, the Fourth International Conference on E-Commerce, E-Business, and E-Government, which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France, and sponsored by the International Federation for Information Processing (IFIP). The book contains recent results and developments in the following areas: E-Government: E-Government Models and Processes, E-Governance, Service Provisioning. E-Business: Infrastructures and Marketplaces, M-Commerce, Purchase and Payment. E-Commerce: Value Chain Management, E-Business Architectures and Processes, E-Business Models.
Towards the Knowledge Society is a state-of-the-art book covering innovative trends in the design, implementation and dissemination of eCommerce, eBusiness, and eGovernment. The book contains recent results of research and development in the areas of: - eGoverment; | - eMarkets; - eLearning; - eBusiness (B2B and B2C); - Trust, Security and Fraud; - Public Services and Health; - Design of I.S., Web and Technology Systems; - Applications and Procedures for eCommerce/eBusiness. Towards the Knowledge Society comprises the proceedings of I3E 2002, the Second International Conference on eCommerce, eBusiness, eGovernment, which was sponsored by the International Federation for Information Processing (IFIP) and held in Lisbon, Portugal in October 2002.
This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held in Kyoto, Japan in October 2006. The 30 revised full papers presented were carefully reviewed and selected from 147 submissions.
This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.
This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2019, held in Lisbon, Portugal, in June 2019. The 26 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on intrusion detection, access control, organizational and behavioral, crypto and encryption, and integrity.
Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous. This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.
This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised full papers and 14 short papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on intrusion detection, data security, mobile security, privacy, metrics and risk assessment, information flow control, identity management, identifiability and decision making, malicious behavior and fraud and organizational security.
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.
This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.