Certification and Security in Inter-Organizational E-Services


Book Description

Certification and Security in Inter-Organizational E-Services presents the proceedings of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC in August 2004 in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout society, and given the legal value that is often attached to data treated or exchanged, it is critical to be able to certify the network transactions and ensure that the integrity of the involved computer-based systems is maintained. This collection of papers documents several important developments, and offers real-life application experiences, research results and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities.




Certification and Security in E-Services


Book Description

This volume contains the final proceedings of the special stream on security in E-government and E-business. This stream has been an integral part of the IFIP World Computer Congress 2002, that has taken place from 26-29 August 2002 in Montreal, Canada. The stream consisted of three events: one tutorial and two workshops. The tutorial was devoted to the theme "An Architecture for Information Se curity Management", and was presented by Prof. Dr. Basie von Solms (Past chairman of IFIP TC 11) and Prof. Dr. Jan Eloff (Past chairman of IFIP TC 11 WG 11.2). Both are from Rand Afrikaans University -Standard Bank Academy for Information Technology, Johannesburg, South Africa. The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management and was specifically of value for people involved in, or who wanted to find out more about the management of information secu rity in a company. It provided a reference framework covering all three of the relevant levels or dimensions of Information Security Management. The theme of the first workshop was "E-Government and Security" and was chaired by Leon Strous, CISA (De Nederlandsche Bank NY, The Netherlands and chairman of IFIP TC 11) and by Sabina Posadziejewski, I.S.P., MBA (Al berta Innovation and Science, Edmonton, Canada).




E-Commerce Trends for Organizational Advancement: New Applications and Methods


Book Description

While buying and selling goods and services once necessitated a face-to-face transaction, much of the commerce we now undertake is completely electronic. Recent advances in electronic and mobile commerce, precipitated by innovations in technology and user acceptance, have led to subsequent changes in individual and organizational behavior. E-Commerce Trends for Organizational Advancement: New Applications and Methods gathers essential research on the changing face of commerce, investigating the development, delivery, and perception of e- and m- commerce systems and tools.




Handbook of Research on Public Information Technology


Book Description

"This book compiles estimable research on the global trend toward the rapidly increasing use of information technology in the public sector, discussing such issues as e-government and e-commerce; project management and information technology evaluation; system design and data processing; security and protection; and privacy, access, and ethics of public information technology"--Provided by publisher.







Technologies for E-Services


Book Description

This book constitutes the refereed preceedings of the Third International Workshop on Technologies for E-Servies, TES 2002, held in conjunction with VLDB 2002 in Hong Kong, China in August 2002. The 14 revised full papers presented together with 4 invited papers were carefully reviewed and selected. Among the topics addressed are database issues for e-services, b2b integration, model transformation, process-based application development, information fusion, information integration, business relation management, mobil servies, trust-based web security models, etc.




Service-Oriented Computing


Book Description

This book constitutes the proceedings of the 17th International Conference on Service-Oriented Computing, ICSOC 2019, held in Toulouse, France, in October 2019. The 28 full and 12 short papers presented together with 7 poster and 2 invited papers in this volume were carefully reviewed and selected from 181 submissions. The papers have been organized in the following topical sections: Service Engineering; Run-time Service Operations and Management; Services and Data; Services in the Cloud; Services on the Internet of Things; Services in Organizations, Business and Society; and Services at the Edge.




Component-Based Software Engineering


Book Description

This is the refereed proceedings of the 9th International Symposium on Component-Based Software Engineering, CBSE 2006, held in Västerås, Sweden in June/July 2006. The 22 revised full papers and 9 revised short papers presented cover issues concerned with the development of software-intensive systems from reusable parts, the development of reusable parts, and system maintenance and improvement by means of component replacement and customization.




Foundations and Practice of Security


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Foundations and Practice of Security, FPS 2015, held in Clermont-Ferrand, France, in October 2015. The 12 revised full papers presented together with 8 short papers and 2 keynote talks were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on RFID, sensors and secure computation; security policies and biometrics; evaluation of protocols and obfuscation security; spam emails, botnets and malware.




Simulation in Computer Network Design and Modeling: Use and Analysis


Book Description

"This book reviews methodologies in computer network simulation and modeling, illustrates the benefits of simulation in computer networks design, modeling, and analysis, and identifies the main issues that face efficient and effective computer network simulation"--Provided by publisher.