1.

Record Nr.

UNINA9910375769003321

Titolo

Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy / / Gail-Joon Ahn, [and three others], editors

Pubbl/distr/stampa

Description based on publisher supplied metadata and other sources. : , : Association for Computing Machinery, , 2019

Descrizione fisica

1 online resource (363 pages) : illustrations

Collana

ACM Conferences

Disciplina

005.8

Soggetti

Computer security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Sommario/riassunto

It is our great pleasure to welcome you to the ninth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2019), which follows the successful eight editions held in February/March 2011-2018. This conference series has been founded to foster novel and exciting research in this arena and to help generate new directions for further research and development. The initial concept was established by the two co-founders, Elisa Bertino and Ravi Sandhu, and sharpened by subsequent discussions with a number of fellow data security and privacy researchers. Their enthusiastic encouragement persuaded the co-founders to move ahead with the always daunting task of creating a high-quality conference. Data and applications that manipulate data are crucial assets in today's information age. With the increasing drive towards availability of data and services anytime and anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. Important applications such as homeland security, social networking and social computing provide value by aggregating input from numerous individual users, and the mobile devices they carry. The emerging area of Internet of Things also poses serious privacy and



security challenges. To achieve efficiency and effectiveness in traditional domains such as healthcare, there is a drive to make these records electronic and highly available. The need for organizations to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain. Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. In response to the call for papers of CODASPY 2019, 119 papers were submitted from Africa, Asia, Europe, South America and North America. The program committee selected 28 full-length research papers (23.5% acceptance rate). These papers cover a variety of topics, including security issues in web, cloud, IoT, and mobile devices, privacy, access control, authentication, malware, code analysis, and hardware and system security. The program includes a poster paper session presenting exciting work in progress. The program is complemented by two keynote speeches by Anupam Joshi and Engin Kirda. This year's edition also features three workshops: the ACM International Workshop on Security and Privacy Analytics, the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, and the ACM Workshop on Automotive Cybersecurity, and a panel on the research challenges at the intersection on AI, Big Data and CyberSecurity.



2.

Record Nr.

UNINA9910683341303321

Autore

Ziemba Ewa

Titolo

Information Technology for Management: Approaches to Improving Business and Society : AIST 2022 Track and 17th Conference, ISM 2022, Held as Part of FedCSIS 2022, Sofia, Bulgaria, September 4–7, 2022, Extended and Revised Selected Papers / / edited by Ewa Ziemba, Witold Chmielarz, Jarosław Wątróbski

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023

ISBN

9783031295706

9783031295690

Edizione

[1st ed. 2023.]

Descrizione fisica

1 online resource (242 pages)

Collana

Lecture Notes in Business Information Processing, , 1865-1356 ; ; 471

Altri autori (Persone)

ChmielarzWitold

WątróbskiJarosław

Disciplina

005.3

Soggetti

Application software

Business - Data processing

Information technology - Management

Artificial intelligence

Computer and Information Systems Applications

Business Informatics

Computer Application in Administrative Data Processing

Artificial Intelligence

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Configuration Approach of User Requirements for Analytical Applications - Challenges, State of the Art and Evaluation -- Human Performance Management: A Humanist and Supportive Model for IT Professionals -- Companies in Multilingual Wikipedia: Articles Quality and Important Sources of Information -- Analysis for Women’s’ Menstrual Health Disorders using Artificial Intelligence -- Symptoms of Dementia in Elderly Persons using Waveform Features of Pupil Light Reflex -- Assessment of Optimisation Results for Shared Cars -- A Students’ Perception of Distance Activities during the COVID-19 Pandemic: Polish and Ukrainian Perspective -- The Iterative Compromise Ranking Analysis (ICRA) – the New Approach to Make



Reliable Decisions -- Temporal SWARA-SPOTIS for Multi-Criteria Assessment of European Countries Regarding Sustainable RES Exploitation -- A Sustainable Approach for Determining Compromise Ranking Based on Intuitonistic Fuzzy Score Functions -- Missing Types Prediction in Linked Data Using Deep Neural Network with Attention Mechanism: Case Study on DBpedia and UniProt Datasets.

Sommario/riassunto

This book constitutes revised selected and extended papers presented at track 4 of the Conference on Computer Science and Intelligence Systems, FedCSIS 2022, which took place in Sofia, Bulgaria, during September 4–7, 2022. The FedCSIS Information Systems and Technologies Track included AIST 2022, DSH 2022, ISM 2022, and KAM 2022. AIST 2022 received 11 submissions, from which 2 full papers and 1 short paper have been accepted; for DSH 2022 2 full and 3 short papers have been accepted from 15 submissions; and for ISM 2022 2 full and 1 short papers have been accepted from 11 submissions. From the 17 submissions to KAM 2022, no paper passed the extended reviews, so the overall acceptance rate was 20% for full and 18% for short papers. The papers were organized in topical sections named: Approaches to improving business; approaches to improving society; and methods for improving business and society.