You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The field of database security has expanded greatly, with the rapid development of global inter-networked infrastructure. Databases are no longer stand-alone systems accessible only to internal users of organizations. Today, businesses must allow selective access from different security domains. New data services emerge every day, bringing complex challenges to those whose job is to protect data security. The Internet and the web offer means for collecting and sharing data with unprecedented flexibility and convenience, presenting threats and challenges of their own. This book identifies and addresses these new challenges and more, offering solid advice for practitioners and researchers in industry.
The field of Information Systems has been shifting from an aeimmersion viewAE, which relies on the immersion of information technology (IT) as part of the business environment, to a aefusion viewAE in which IT is fused within the business environment, forming a unified fabric that integrates work and personal life, as well as personal and public information. In the context of this fusion view, decision support systems should achieve a total alignment with the context and the personal preferences of users. The advantage of such a view is an opportunity of seamless integration between enterprise environments and decision support system components. Thus, researchers and practitioners have to ad...
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.
This book constitutes the refereed proceedings of 6 international workshops held in conjunction with the 4th International Conference on Business Process Management, BPM 2006, in Vienna, Austria in September 2006. The 40 revised full papers presented were carefully reviewed and selected from a total of 94 overall submissions to six international workshops.
This book constitutes the refereed proceedings of the 24th International Conference on Advanced Information Systems Engineering, CAiSE 2012, held in Gdansk, Poland, in June 2012. The 42 revised full papers, 2 full-length invited papers and 4 short tutorial papers, were carefully reviewed and selected from 297 submissions. The contributions have been grouped into the following topical sections: business process model analysis; service and component composition; language and models; system variants and configuration; process mining; ontologies; requirements and goal models; compliance; monitoring and prediction; services; case studies; business process design; feature models and product lines; and human factors.
This book constitutes the refereed proceedings of the 5th European Semantic Web Conference, ESWC 2008, held in Tenerife, Canary Islands, Spain, in June 2008. The 51 revised full papers presented together with 3 invited talks and 25 system description papers were carefully reviewed and selected from a total of 270 submitted papers. The papers are organized in topical sections on agents, application ontologies, applications, formal languages, foundational issues, learning, ontologies and natural language, ontology alignment, query processing, search, semantic Web services, storage and retrieval of semantic Web data, as well as user interfaces and personalization.
As organizations, businesses, and other institutions work to move forward during a new era of ubiquitous modern technology, new computing and technology implementation strategies are necessary to harness the shared knowledge of individuals to advance their organizations as a whole. Intelligent and Knowledge-Based Computing for Business and Organizational Advancements examines the emerging computing paradigm of Collective Intelligence (CI). The global contributions contained in this publication will prove to be essential to both researchers and practitioners in the computer and information science communities as these populations move toward a new period of fully technology-integrated business.
This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.
Conceptual modeling has long been recognized as the primary means to enable so- ware development in information systems and data engineering. Conceptual modeling provides languages, methods and tools to understand and represent the application domain; to elicit, conceptualize and formalize system requirements and user needs; to communicate systems designs to all stakeholders; and to formally verify and validate systems design on high levels of abstraction. The International Conference on Conceptual Modeling provides a premiere forum for presenting and discussing current research and applications in which the major emphasis is on conceptual modeling. Topics of interest span the entire spectru...
This book constitutes the proceedings of the 22nd International Conference on Advanced Information Systems Engineering, CAiSE 2010, held im Hammamet, Tunisia, in June 2010. The 39 papers presented were carefully reviewed and selected from 299 submissions. The topics covered are business process modeling, information systems quality, service modelling, security management, matching and mining, case studies and experiences, conceptual modelling, adaptation, requirements, and process analysis. In addition this volume contains two keynote papers and the abstract of a panel discussion.