1.

Record Nr.

UNINA9910703409503321

Autore

Lammert Michael Dean <1949->

Titolo

Reducing fuel consumption through semi-automated platooning with Class 8 tractor trailer combinations / / Michael Lammert and Jeffrey Gonder

Pubbl/distr/stampa

[Golden, Colo.] : , : National Renewable Energy Laboratory, , 2014

Descrizione fisica

1 online resource (1 poster) : color illustrations

Collana

NREL/PO ; ; 5400-62494

Soggetti

Tractor trailer combinations - Energy consumption - United States

Tractor trailer combinations - Energy conservation - United States

Lingua di pubblicazione

Inglese

Formato

Grafica

Livello bibliografico

Monografia

Note generali

Title from title screen (viewed on Feb. 24, 2015).

"July 15, 2014."

"Automated Vehicles Symposium 2014, San Francisco CA, July 15, 2014."



2.

Record Nr.

UNINA9910484729403321

Titolo

Information Systems Security : Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings / / edited by Aditya Bagchi, Vijayalakshmi Atluri

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006

ISBN

3-540-68963-X

Edizione

[1st ed. 2006.]

Descrizione fisica

1 online resource (XVI, 384 p.)

Collana

Security and Cryptology, , 2946-1863 ; ; 4332

Altri autori (Persone)

BagchiAditya

AtluriVijayalaksmi

Disciplina

05.8

Soggetti

Cryptography

Data encryption (Computer science)

Computer networks

Data protection

Computers and civilization

Electronic data processing - Management

Information storage and retrieval systems

Cryptology

Computer Communication Networks

Data and Information Security

Computers and Society

IT Operations

Information Storage and Retrieval

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Invited Papers -- Privacy in the Electronic Society -- A Data Sharing Agreement Framework -- Password Exhaustion: Predicting the End of Password Usefulness -- Network Monitoring for Security and Forensics -- Data and Application Security -- Fairness Strategy for Multilevel Secure Concurrency Control Protocol -- Optimistic Anonymous Participation in Inter-organizational Workflow Instances -- O2O: Virtual Private Organizations to Manage Security Policy Interoperability --



Privacy Preserving Web-Based Email -- Access Control -- Context-Aware Provisional Access Control -- LRBAC: A Location-Aware Role-Based Access Control Model -- Extending Context Descriptions in Semantics-Aware Access Control -- Specification and Realization of Access Control in SPKI/SDSI -- Key Management and Security in Wireless Networks -- Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack -- An Efficient Key Assignment Scheme for Access Control in a Hierarchy -- Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers -- Secure Data Management in Reactive Sensor Networks -- Threat Analysis, Detection and Recovery -- Security Ontology: Simulating Threats to Corporate Assets -- Two-Stage Credit Card Fraud Detection Using Sequence Alignment -- New Malicious Code Detection Using Variable Length n-grams -- A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes -- Cryptography and Encryption -- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack -- A Partial Image Encryption Method with Pseudo Random Sequences -- High Capacity Lossless Data Hiding -- An Implementation and Evaluation of Online Disk Encryption for Windows Systems -- Short Papers and Research Reports -- Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract) -- A Survey of Control-Flow Obfuscations -- Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments -- Secure Itineraries Framework for Mobile Agent Systems -- Malafide Intension Based Detection of Privacy Violation in Information System -- Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report) -- Towards a Formal Specification Method for Enterprise Information System Security -- Recent Research on Privacy Preserving Data Mining.

Sommario/riassunto

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.