You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
"This book provides an overall view of trust for e-services including definitions, constructs, and relationships with other research topics such as security, privacy, reputation and risk. It offers contributions from real-life experience and practice on how to build a trust environment for e-government services"--Provided by publisher.
This book constitutes the refereed proceedings of the Third International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2006, held in Mallorca, Spain in September 2006. The book presents 40 revised full papers, carefully reviewed and selected from numerous submissions. The papers cover all current issues in cooperative design, visualization, and engineering, ranging from theoretical and methodological topics to various systems and frameworks to applications in a variety of fields.
"This book reports on the latest advances in privacy protection issues and technologies for e-services, ranging from consumer empowerment to assess privacy risks, to security technologies needed for privacy protection, to systems for privacy policy enforcement, and even methods for assessing privacy technologies"--Provided by publisher.
The second International Symposium on Electronic Commerce was held in Hong Kong, April 2001, in conjunction with the fourth International Workshop on the Technological Challenges of Electronic Commerce. This symposium belongs to the- commerce conference series started in 1998 in Toronto, Canada. Since then, every year, there has been an international workshop on the technological challenges of electronic commerce, and every other year, in conjunction with the workshop, an international symposium on electronic commerce is held. The following workshops have been held so far. • The first International Workshop on the Technological Challenges of Electronic Commerce was held in September 1998, ...
In the past few years, secure information sharing became very popular in the area of immigration, military applications, healthcare, education, foreign affairs, etc. As secure communication utilizes both wireless and wired communication mechanizations for exchanging sensitive information, security and privacy of the information exchange cannot be easily compromised. To moderate the security, integrity, authenticity, and privacy issues related to information exchange, numerous authentication mechanisms have been recommended by different researchers in the literature in recent times, but these are vulnerable to prospective security flaws such as masquerade, insider, replay, impersonation, pass...
Communication Systems: The State of the Art captures the depth and breadth of the field of communication systems: -Architectures and Protocols for Distributed Systems; -Network and Internetwork Architectures; -Performance of Communication Systems; -Internet Applications Engineering; -Management of Networks and Distributed Systems; -Smart Networks; -Wireless Communications; -Communication Systems for Developing Countries; -Photonic Networking; -Communication Systems in Electronic Commerce. This volume's scope and authority present a rare opportunity for people in many different fields to gain a practical understanding of where the leading edge in communication systems lies today-and where it will be tomorrow.
It is becoming quite clear that there will be important technological advances in - bile and wireless connectivity, known as third-/fourth-generation (3G and 4G) mobile telecommunications systems. As a result we will be surrounded by ever-growing m- tidomain (technical and administrative) heterogeneous communications in both wired and wireless networks. This resulting environment deals with communication in m- tizoned networks, where people, devices, appliances and servers are connected to each other via different kinds of networks. Networks will be pervasive, ubiquitous, multis- vice, multioperatorand multiaccess. The mobility trend will also be spurred forward by the growing availability o...
Provides research on e-government and its implications within the global context. Covers topics such as digital government, electronic justice, government-to-government, information policy, and cyber-infrastructure research and methodologies.
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8–10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty,and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the paper...
This book constitutes the refereed proceedings of the 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004, held in Ottawa, Canada, in May 2004. The 129 revised full papers presented were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on neural networks, bioinformatics, data mining, general applications, autonomous agents, intelligent systems, knowledge processing and NLP, intelligent user interfaces, evolutionary computing, fuzzy logic, human-roboter interaction, computer vision and image processing, machine learning and case-based reasoning, heuristic search, security, Internet applications, planning and scheduling, constraint satisfaction, e-learning, expert systems, applications to design, machine learning, and image processing.