Fourteenth Annual Computer Security Applications Conference


Book Description

The proceedings from the December 1998 conference consists of 35 papers, which have been kept in chronological order as they were presented, and provides practical solutions to real security problems. Day one addresses network intrusion detection, security administration, information infrastructure, and Internet technologies. The second day covers legal liability, electronic commerce, architectures, high-speed networks, cryptography, and intrusion detection. Subjects of the final day are digital signatures, assurance, and secure transactions. No index. Annotation copyrighted by Book News, Inc., Portland, OR.




15th Annual Computer Security Applications Conference


Book Description

Proceedings of a December 1999 conference, with papers in sections on electronic commerce, system engineering, networks, security analysis, workflow, crypto, composition problems of component TOEs, security policy, and public infrastructures. Other subjects include information security education, mobile code, legal and technical responses to protecting US critical infrastructures, security architectures, middleware, and intrusion detection. Some specific topics are security policy coordination for heterogeneous information systems, user authentication in the Java platform, and relevancy analysis on the registry of Windows NT 4.0. Lacks a subject index. Annotation copyrighted by Book News, Inc., Portland, OR.




Information Security Applications


Book Description

This book constitutes the refereed proceedings of the 5th International Workshop on Information Security Applications, WISA 2004, held in Jeju Island, Korea in August 2004. The 36 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 169 submissions. The papers are organized in topical sections on network and computer security, public key systems, intrusion detection, watermarking and anti-spamming, digital rights management, e-commerce security, efficient implementations, anonymous communication, and side channel attacks.




Trust and Security in Collaborative Computing


Book Description

Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing ? one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing.This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described.




Mobile Computing Handbook


Book Description

The debut of small, inexpensive, yet powerful portable computers has coincided with the exponential growth of the Internet, making it possible to access computing resources and information at nearly any location at almost any time. This new trend, mobile computing, is poised to become the main technology driver for a decade to come. There are many




Monitoring, Security, and Rescue Techniques in Multiagent Systems


Book Description

In today’s society the issue of security has become a crucial one. This volume brings together contributions on the use of knowledge-based technology in security applications by the world’s leading researchers in the field.




Architectures and Protocols for Secure Information Technology Infrastructures


Book Description

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.




Research Advances in Network Technologies


Book Description

In the present technological age, information is a valuable resource for both small and large enterprises as well as for our daily lives. The key enablers that link computer resources and devices together to gather, process, and distribute crucial data both locally and worldwide are network technologies. For our daily lives and commercial operations, network technologies offer effective, adaptable, and seamless communication while maximizing productivity and resources. Due to its significance, this field has undergone a significant evolution in the past few decades, moving away from traditional wired networks and toward Bluetooth, infrared, microwave, radio, and satellite networks. These days, network technologies are not employed only in computer labs, businesses, or homes; a wide range of domains, such as vehicular ad hoc networks, mobile ad hoc networks, and the Internet of Things, have been seen using network technologies. Researchers from academia and industry have worked hard to build and develop software-based network technologies, such as middleware, protocol stacks, and network software architectures, in addition to hardware-based and physical network technologies. The paradigm shift in this field is being driven primarily by software-based network technologies, which have also given rise to numerous new network innovations, including grid computing, cloud computing, fog computing, edge computing, software-defined networks, and content-centric networks. Significant efforts have been made in cellular network technologies to boost the user experience, and as a result, new cellular network technologies, including LTE, VoLTE, and 5G, have also been developed. Efforts continue to be made by researchers in these networking fields due to the demand for and importance of these technologies in present and future situations. Many of these efforts are still in progress, and there are still possibilities that need to be investigated. As a result, it’s important to stay up to date on network technology developments and look into further research difficulties that need to be resolved for the benefit of users. This book will present the most recent and leading research in the field of network technologies in order to achieve solutions for various problems that exist in this domain.




Agent and Multi-Agent Systems: Technologies and Applications


Book Description

Following from the very successful First KES Symposium on Agent and Multi-Agent Systems – Technologies and Applications (KES-AMSTA 2007), held in Wroclaw, Poland, 31 May–1 June 2007, the second event in the KES-AMSTA symposium series (KES-AMSTA 2008) was held in Incheon, Korea, March 26–28, 2008. The symposium was organized by the School of Computer and Information Engineering, Inha University, KES International and the KES Focus Group on Agent and Mul- agent Systems. The KES-AMSTA Symposium Series is a sub-series of the KES Conference Series. The aim of the symposium was to provide an international forum for scientific research into the technologies and applications of agent and multi-agent systems. Agent and multi-agent systems are related to the modern software which has long been recognized as a promising technology for constructing autonomous, complex and intelligent systems. A key development in the field of agent and multi-agent systems has been the specification of agent communication languages and formalization of ontologies. Agent communication languages are intended to provide standard declarative mechanisms for agents to communicate knowledge and make requests of each other, whereas ontologies are intended for conceptualization of the knowledge domain. The symposium attracted a very large number of scientists and practitioners who submitted their papers for nine main tracks concerning the methodology and applications of agent and multi-agent systems, a doctoral track and two special sessions.




Computer and Information Sciences


Book Description

This book constitutes the refereed proceedings of the 32nd International Symposium on Computer and Information Sciences, ISCIS 2018, held in Poznan, Poland, in September 2018. The 29 revised full papers presented were carefully reviewed and selected from 64 submissions. The papers are dealing with the following topics: smart algorithms; data classification and processing; stochastic modelling; performance evaluation; queuing systems; wireless networks and security; image processing and computer vision.