Collaborative, Trusted and Privacy-Aware e/m-Services


Book Description

This book constitutes the refereed conference proceedings of the 12th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2013, held in Athens, Greece, in April 2013. The 25 revised papers presented together with a keynote speech were carefully reviewed and selected from numerous submissions. They are organized in the following topical sections: trust and privacy; security, access control and legal requirements in cloud systems; protocols, regulation and social networking; adoption issues in e/m-services; new services adoption and ecological behavior; knowledge management and business processes; and management, policies and technologies in e/m-services.




Trust, Privacy and Security in Digital Business


Book Description

This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 11 full and 4 short papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: blockchain, cloud security/hardware; economics/privacy; human aspects; privacy; privacy and machine learning; trust.




Establishing the Foundation of Collaborative Networks


Book Description

This book includes a number of selected papers from the PRO-VE '07 Conference, providing a comprehensive overview of recent advances in various Collaborative Networks domains. It covers trust aspects, performance and value systems, VO breeding environments, VO creation, e-contracting, collaborative architectures and frameworks, professional virtual communities, interoperability issues, business benefits, and case studies and applications in industry and services.




Trust, Privacy and Security in Digital Business


Book Description

This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; trust and reputation in pervasive environments; trust and privacy issues in mobile environments; security and privacy in the cloud; security policies/usability issues; and privacy requirements and privacy audit.




Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications


Book Description

The censorship and surveillance of individuals, societies, and countries have been a long-debated ethical and moral issue. In consequence, it is vital to explore this controversial topic from all angles. Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications is a vital reference source on the social, moral, religious, and political aspects of censorship and surveillance. It also explores the techniques of technologically supported censorship and surveillance. Highlighting a range of topics such as political censorship, propaganda, and information privacy, this multi-volume book is geared towards government officials, leaders, professionals, policymakers, media specialists, academicians, and researchers interested in the various facets of censorship and surveillance.




Elicitation


Book Description

This book is about elicitation: the facilitation of the quantitative expression of subjective judgement about matters of fact, interacting with subject experts, or about matters of value, interacting with decision makers or stakeholders. It offers an integrated presentation of procedures and processes that allow analysts and experts to think clearly about numbers, particularly the inputs for decision support systems and models. This presentation encompasses research originating in the communities of structured probability elicitation/calibration and multi-criteria decision analysis, often unaware of each other’s developments. Chapters 2 through 9 focus on processes to elicit uncertainty from experts, including the Classical Method for aggregating judgements from multiple experts concerning probability distributions; the issue of validation in the Classical Method; the Sheffield elicitation framework; the IDEA protocol; approaches following the Bayesian perspective; the main elements of structured expert processes for dependence elicitation; and how mathematical methods can incorporate correlations between experts. Chapters 10 through 14 focus on processes to elicit preferences from stakeholders or decision makers, including two chapters on problems under uncertainty (utility functions), and three chapters that address elicitation of preferences independently of, or in absence of, any uncertainty elicitation (value functions and ELECTRE). Two chapters then focus on cross-cutting issues for elicitation of uncertainties and elicitation of preferences: biases and selection of experts. Finally, the last group of chapters illustrates how some of the presented approaches are applied in practice, including a food security case in the UK; expert elicitation in health care decision making; an expert judgement based method to elicit nuclear threat risks in US ports; risk assessment in a pulp and paper manufacturer in the Nordic countries; and elicitation of preferences for crop planning in a Greek region.




Blockchain and Trustworthy Systems


Book Description

This book constitutes the thoroughly refereed post conference papers of the First International Conference on Blockchain and Trustworthy Systems, Blocksys 2019, held in Guangzhou, China, in December 2019. The 50 regular papers and the 19 short papers were carefully reviewed and selected from 130 submissions. The papers are focus on Blockchain and trustworthy systems can be applied to many fields, such as financial services, social management and supply chain management.




Advances in Knowledge-based and Intelligent Information and Engineering Systems


Book Description

In this 2012 edition of Advances in Knowledge-Based and Intelligent Information and Engineering Systems the latest innovations and advances in Intelligent Systems and related areas are presented by leading experts from all over the world. The 228 papers that are included cover a wide range of topics. One emphasis is on Information Processing, which has become a pervasive phenomenon in our civilization. While the majority of Information Processing is becoming intelligent in a very broad sense, major research in Semantics, Artificial Intelligence and Knowledge Engineering supports the domain specific applications that are becoming more and more present in our everyday living. Ontologies play a major role in the development of Knowledge Engineering in various domains, from Semantic Web down to the design of specific Decision Support Systems. Research on Ontologies and their applications is a highly active front of current Computational Intelligence science that is addressed here. Other subjects in this volume are modern Machine Learning, Lattice Computing and Mathematical Morphology.The wide scope and high quality of these contributions clearly show that knowledge engineering is a continuous living and evolving set of technologies aimed at improving the design and understanding of systems and their relations with humans.




Intelligent Computing, Communication and Devices


Book Description

In the history of mankind, three revolutions which impact the human life are tool-making revolution, agricultural revolution and industrial revolution. They have transformed not only the economy and civilization but the overall development of the human society. Probably, intelligence revolution is the next revolution, which the society will perceive in the next 10 years. ICCD-2014 covers all dimensions of intelligent sciences, i.e. Intelligent Computing, Intelligent Communication and Intelligent Devices. This volume covers contributions from Intelligent Computing, areas such as Intelligent and Distributed Computing, Intelligent Grid & Cloud Computing, Internet of Things, Soft Computing and Engineering Applications, Data Mining and Knowledge discovery, Semantic and Web Technology, and Bio-Informatics. This volume also covers paper from Intelligent Device areas such as Embedded Systems, RFID, VLSI Design & Electronic Devices, Analog and Mixed-Signal IC Design and Testing, Solar Cells and Photonics, Nano Devices and Intelligent Robotics.




Advanced Research on Electronic Commerce, Web Application, and Communication


Book Description

The two-volume set CCIS 143 and CCIS 144 constitutes the refereed proceedings of the International Conference on Electronic Commerce, Web Application, and Communication, ECWAC 2011, held in Guangzhou, China, in April 2011. The 148 revised full papers presented in both volumes were carefully reviewed and selected from a large number of submissions. Providing a forum for engineers, scientists, researchers in electronic commerce, Web application, and communication fields, the conference will put special focus also on aspects such as e-business, e-learning, and e-security, intelligent information applications, database and system security, image and video signal processing, pattern recognition, information science, industrial automation, process control, user/machine systems, security, integrity, and protection, as well as mobile and multimedia communications.