Limit search to available items
Book Cover
E-book
Author International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (2012 : Prague, Czech Republic)

Title Multidisciplinary research and practice for information systems : IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings / Gerald Quirchmayr [and others] (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7465
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI
Lecture notes in computer science ; 7465.
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Contents Ontology-Based Identification of Research Gaps and Immature Research Areas / Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel and Holger Schmidt, et al. -- A Context-Aware Mashup Integration Guideline for Enterprise 2.0 / Gerald Bader, Amin Anjomshoaa and A Min Tjoa -- Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline Blends / Mostafa Kiani Deh Kiani, Barat Ghobadian, Fathollah Ommi, Gholamhassan Najafi and Talal Yusaf -- Validation of XML Documents with SWRL / Jesús M. Almendros-Jiménez -- A Taxonomy of Dirty Time-Oriented Data / Theresia Gschwandtner, Johannes Gärtner, Wolfgang Aigner and Silvia Miksch -- Combining Relational and Semi-structured Databases for an Inquiry Application / Marius Ebel and Martin Hulin -- Hunting for Aardvarks: Can Software Security Be Measured? / Martin Gilje Jaatun -- A Foundation for Requirements Analysis of Privacy Preserving Software / Kristian Beckers and Maritta Heisel -- On Complexity Reduction of User Interfaces for Safety-Critical Systems / Andreas Holzinger, Evgenia Popova, Bernhard Peischl and Martina Ziefle -- Security SLAs -- An Idea Whose Time Has Come? / Martin Gilje Jaatun, Karin Bernsmed and Astrid Undheim -- UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept / Aneta Poniszewska-Maranda
A Formal Equivalence Classes Based Method for Security Policy Conformance Checking / Eckehard Hermann, Udo Litschauer and Jürgen Fuß -- Trust as an Organismic Trait of E-Commerce Systems / Tanja Ažderska and Borka Jerman Blažič -- Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones / Andreas Holzinger, Peter Treitler and Wolfgang Slany -- Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives / Mersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla and Athanasios Tsakalidis -- Near Duplicate Document Detection for Large Information Flows / Daniele Montanari and Piera Laura Puglisi -- TinyStream Sensors / Pedro Furtado -- Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data / Hiroshi Sato, Hisashi Kurasawa, Takeru Inoue, Motonori Nakamura and Hajime Matsumura, et al. -- Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language Modeling / Rachid Aknouche, Ounas Asfari, Fadila Bentayeb and Omar Boussaid -- Indexing and Search for Fast Music Identification / Guang-Ho Cha -- Ontology-Based Retrieval of Experts -- The Issue of Efficiency and Scalability within the eXtraSpec System / Elżbieta Bukowska, Monika Kaczmarek, Piotr Stolarski and Witold Abramowicz
OrderBased Labeling Scheme for Dynamic XML Query Processing / Beakal Gizachew Assefa and Belgin Ergenc -- A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query Languages / Anna Formica, Mauro Mazzei, Elaheh Pourabbas and Maurizio Rafanelli -- Usage Control in Inter-organisational Collaborative Environments -- A Case Study from an Industry Perspective / Åsmund Ahlmann Nyre and Martin Gilje Jaatun -- Stock Market Multi-Agent Recommendation System Based on the Elliott Wave Principle / Monica Tirea, Ioan Tandau and Viorel Negru -- Similarity of Transactions for Customer Segmentation / Ke Lu and Tetsuya Furukawa -- Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover Venues / Jakub Dzikowski, Monika Kaczmarek, Szymon Lazaruk and Witold Abramowicz -- Pay-As-You-Go Data Integration Using Functional Dependencies / Naser Ayat, Hamideh Afsarmanesh, Reza Akbarinia and Patrick Valduriez -- Analyzing Recommender System's Performance Fluctuations across Users / Charif Haydar, Azim Roussanaly and Anne Boyer -- A Secure Distributed Video Surveillance System Based on Portable Devices / Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione and Arcangelo Castiglione, et al
Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel / Clara Maria Colombini, Antonio Colella, Marco Mattiucci and Aniello Castiglione -- How to Forge a Digital Alibi on Mac OS X / Aniello Castiglione, Giuseppe Cattaneo, Roberto De Prisco, Alfredo De Santis and Kangbin Yim -- Security-and-Privacy-Related Issues on IT Systems During Disasters / Shinsaku Kiyomoto, Kazuhide Fukushima and Yutaka Miyake -- Semantic Techniques of Image Retrieval -- The Example of a Structural Analysis of Coronary Arteries / Mirosław Trzupek and Marek R. Ogiela -- Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm / Tomasz Hachaj and Marek R. Ogiela -- Automatic Image Annotation Using Semantic Text Analysis / Dongjin Choi and Pankoo Kim -- Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control / Chengjun Wang, Baokang Zhao, Wanrong Yu, Chunqing Wu and Zhenghu Gong -- Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive Maps / Giovanni Acampora, Vincenzo Loia and Autilia Vitiello -- Mobile Malware Threats and Defenses for Homeland Security / Seung-Hyun Seo, Kangbin Yim and Ilsun You
Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security Agencies / Muhammad Naveed Iqbal Qureshi, Jin-Tae Kim and Sang-Woong Lee -- Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts / Marek Zachara and Dariusz Pałka -- A Formal Support for Collaborative Data Sharing / Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi and Luca Wiegand -- Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures / Fredrik Seehusen and Bjørnar Solhaug -- A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation / Yi-Li Huang, Fang-Yie Leu and Cheng-Ru Dai -- Discussion on the Challenges and Opportunities of Cloud Forensics / Rainer Poisel and Simon Tjoa -- Towards a Logical Framework for Reasoning about Risk / Matteo Cristani, Erisa Karafili and Luca Viganò -- A Collaborative Approach to Botnet Protection / Matija Stevanovic, Kasper Revsbech, Jens Myrup Pedersen, Robin Sharp and Christian Damsgaard Jensen -- Consensus Building and In-operation Assurance for Service Dependability / Yutaka Matsuno and Shuichiro Yamamoto -- Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping / Munkhbaatar Doyoddorj and Kyung-Hyune Rhee
Summary This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and validation; trust, security, privacy, and safety; mobile applications; data processing and management; retrieval and complex query processing; e-commerce; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012
Analysis Computer science
Data protection
Data encryption (Computer science)
Information storage and retrieval systems
Management information systems
Information Systems Applications (incl. Internet)
Systems and Data Security
Information Storage and Retrieval
e-Commerce/e-business
Business Information Systems
Notes English
Subject Computer security -- Congresses
Computer networks -- Management -- Congresses
Electronic data processing -- Distributed processing -- Congresses
Computer networks -- Security measures -- Congresses
Informatique.
Computer networks -- Management
Computer networks -- Security measures
Computer security
Electronic data processing -- Distributed processing
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Quirchmayr, Gerald
ISBN 9783642324987
3642324983
Other Titles CD-ARES 2012