Description |
1 online resource (xiv, 177 pages) : illustrations |
Series |
Communications in Computer and Information Science, 1865-0929 ; 182 |
|
Communications in computer and information science ; 182. 1865-0929
|
Contents |
Cloud Computing -- Towards Trustworthiness Assurance in the Cloud / Francesco Di Cerbo [and others] -- Security and Privacy in Mobile Cloud Under a Citizen's Perspective / Dimitris Geneiatakis [and others] -- Bringing Accountability to the Cloud: Addressing Emerging Threats and Legal Perspectives / Massimo Felici [and others] -- Introducing Life Management Platforms and Collaborative Service Fusion to Contextual Environments / Mario Hoffmann and Pekka Jäppinen -- Security and Privacy Management -- Integrating Advanced Security Certification and Policy Management / Michele Bezzi [and others] -- Security Property Lifecycle Management for Secure Service Compositions / Shahidul Hoque [and others] -- Data Privacy Implications for Security Information and Event Management Systems and Other Meta-Systems / Herah Khan and Andrew Hutchison -- Modelling of Integrated Trust, Governance and Access / William J. Buchanan [and others] -- Security and Privacy Technology -- A Marketplace for Business Software with Certified Security Properties / Midhat Ali, Antonino Sabetta and Michele Bezzi -- Attribute Based Credentials Towards Refined Public Consultation Results and Effective eGovernance / Paul Spirakis and Yannis C. Stamatiou -- Extending Attribute Based Access Control to Facilitate Trust in eHealth and Other Applications / Jim Longstaff -- Security and Privacy Policy -- Coordination of Trust and Security Project Clustering / Jim Clarke, Paul Malone and Catherine Bodeau-Pean -- Electronic Identity Adoption: Online Survey / Hugo Kerschot and Jiri Bouchal -- Anti-War Era: The Need for Proactive Cyber Security / Sven Herpig |
Summary |
The CCIS series is devoted to the publication of peer-reviewed proceedings of conferences and workshops. Its aim is to efficiently disseminate original research results in computer science. All CCIS proceedings are available in electronic form from the SpringerLink digital library, and as printed books, and reach libraries and readers worldwide via Springer?s distribution network. Besides globally relevant meetings with internationally representative program committees guaranteeing a strict peer-reviewing and paper-selection process, conferences run by societies or of high regional or national relevance are also considered for publication. Application-oriented and interdisciplinary conferences are also welcome. The topical scope of CCIS spans the entire spectrum of computer science ranging from foundational topics in the theory of computing to information and communications science and technology and a broad variety of interdisciplinary application fields. CCIS proceedings can be published in time for distribution at conferences or as revised proceedings after the event |
Notes |
Includes author index |
|
English |
|
Online resource; title from PDF title page (SpringerLink, viewed October 28, 2013) |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Internet -- Security measures -- Congresses
|
|
Computer security.
|
|
Computer networks.
|
|
Computer Security
|
|
Computer Communication Networks
|
|
Internet
|
|
Computer networks
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Internet -- Security measures
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Felici, Massimo, 1973- editor.
|
|
Trust in the Digital World and Cyber Security and Privacy EU Form (2013 : Brussels, Belgium)
|
ISBN |
9783642412059 |
|
364241205X |
|
3642412041 |
|
9783642412042 |
|