You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. ...
This book constitutes the refereed proceedings of the 12h International Symposium on Business Modeling and Software Design, BMSD 2022, which took place in Fribourg, Switzerland, in June 2022. The 12 full and 9 short papers included in this book were carefully reviewed and selected from a total of 56 submissions. BMSD is a leading international forum that brings together researchers and practitioners interested in business modeling and its relation to software design. Particular areas of interest are: Business Processes and Enterprise Engineering; Business Models and Requirements; Business Models and Services; Business Models and Software; Information Systems Architectures and Paradigms; Data Aspects in Business Modeling and Software Development; Blockchain-Based Business Models and Information Systems; IoT and Implications for Enterprise Information Systems. Each year, a special theme is chosen, for making presentations and discussions more focused. The BMSD 2022 theme is: Information Systems Engineering and Trust.
This book gives detailed descriptions of the development of two large scale multiagent systems: Agent.Hospital and Agent.Enterprise. These two systems have been developed in close cooperation with more than 20 enterprises and hospitals. They demonstrate clearly that multiagent technology has a great potential for innovative information systems, if a high degree of flexibility of the overall systems is required, e.g. because human actors and technical systems exhibit a great degree of local autonomy, or if the work environment is highly dynamic.
Middleware provides an integration framework for multiple and potentially - verse computing platforms. It allows developers to engineer distributed appli- tions more easily, providing abstractions and primitives to handle distribution and coordination. Middlewareisconstantlyfacingnewchallenges.Today’sadvancesincomp- ing, including development of pervasive applications, exacerbates the diversity problem, introducing variations not only in terms of performance, but also in terms of environments and device characteristics. Software engineers are the- fore challenged both in the area of the development of new and scalable m- dleware systems, where open, heterogeneous, component-based platforms...
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.
Peer-to-peer(P2P)computingiscurrentlyattractingenormousmediaattention, spurred by the popularity of ?le sharing systems such as Napster, Gnutella and Morpheus. In P2P systems a very large number of autonomous computing nodes (the peers) pool together their resources and rely on each other for data and services. The wealth of business opportunities promised by P2P networks has gene- ted much industrial interest recently, and has resulted in the creation of various industrial projects, startup companies, and special interest groups. Researchers from distributed computing, networks, agents and databases have also become excited about the P2P vision, and papers tackling open problems in this are...
This book constitutes the thoroughly refereed post-proceedings of the 6th Thematic Workshop of the EU Network of Excellence DELOS on Digital Library Architectures, held in Cagliari, Italy, in June 2004. The 15 revised full papers presented were carefully reviewed. The subjects covered include: service grids for scientific applications, distributed digital libraries, grid computing, peer-to-peer networks, service oriented architectures for digital libraries, a distributed digital library for support of community radios, multimedia management and search, query trading and processing, metadata management, retrieval functionality, and personalization services.
Images and video play a crucial role in visual information systems and multimedia. There is an extraordinary number of applications of such systems in entertainment, business, art, engineering, and science. Such applications often involved large image and video collections, and therefore, searching for images and video in large collections is becoming an important operation. Because of the size of such databases, efficiency is crucial. We strongly believe that image and video retrieval need an integrated approach from fields such as image processing, shape processing, perception, database indexing, visualization, and querying, etc. This book contains a selection of results that was presented...