| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910784535503321 |
|
|
Titolo |
World spatial metadata standards [[electronic resource] ] : scientific and technical descriptions, and full descriptions with crosstable / / The ICA Commission of Spatial Data Standards ; editor, Harold Moellering ; associate editor, Henri J.G.L. Aalders ; associate editor, Aaron Crane |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Amsterdam ; ; San Diego, CA ; ; Oxford, : Elsevier, 2005 |
|
|
|
|
|
|
|
ISBN |
|
1-280-63008-6 |
9786610630080 |
0-08-045761-4 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (712 p.) |
|
|
|
|
|
|
Collana |
|
International Cartographic Association |
|
|
|
|
|
|
Altri autori (Persone) |
|
MoelleringHarold |
AaldersHenri J. G. L |
CraneAaron |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Information storage and retrieval systems - Geography - Standards |
Geographic information systems - Standards |
Metadata |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Includes a large, single-sheet table in a plastic pouch inside back cover. |
"Published on behalf of the International Cartographic Association." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Dedication; Contents; Presidential Foreword; ISO/TC 211 Foreword; GIS Foreword; Editors' Preface; Introduction to Spatial Metadata Standards in the world; An Introduction to Metadatafor Geographic Information; Introduction; History of metadata; Fundamentals of metadata; Minimal metadataset; Metadata query and distribution services; Experiences in the use of metadata; Regional and national efforts developing metadata; Summary and conclusions; Acknowledgements; References; Regional summaries of spatial metadata developments and associated activities |
European Efforts in the Field of Geographic Metadata and Related SDI ActivitiesIntroduction; European projects funded by the EU; National developments in the field of SDI in Europe; Summary and conclusions; |
|
|
|
|
|
|
|
|
|
|
|
Acknowledgement; References; North American Metadata Standards Developments in Canada and the United States of America; Regional SDI activities; Overview of national metadata and SDI activities; National organisations for NSDI's in North America; Metadata activities in North America; North American geo-spatial metadata - Services/Query; Summary and conclusion; Acknowledgements; References |
Metadata Standards Development Activities in the Asia - Pacific RegionGeneral regional structure for spatial data organisations; Identification of major national spatial data organisations; Identification of specific national/regional metadata standards development activities taking place; Description of metadata query/distribution services that are in operation or planned; Summary and conclusions with prognosis for the future; Acknowledgement; References; Metadata Standards Development Activities in Central and South America and the Caribbean |
General regional structure for spatial data organisationsIdentification of major national spatial data organisations; Identification of specific national/regional metadata standards development activities taking place; Description of metadata query/distribution services that are planned or in operation; Summary and conclusions with prognosis for the future; List of contributors; References; Spatial Metadata in Africa and the Middle East; Introduction; General regional structure for spatial data organisation; African regions; Summary and conclusions; Acknowledgement; References |
Global Spatial Metadata Activities in the ISO/TC211 Geographic Information DomainIntroduction to ISO; ISO 19115, Metadata standard; Description of ISO 19115; Future development; Concluding remarks; References; Scientific and Technical characteristics for assessing metadata standards for geographic datasets; Introduction to the Scientific and Technical Characteristics for Assessing Metadata Standards for Geographic Datasets; Introduction; Terminology for Scientific and Technical Spatial Metadata Standards Characteristics |
Spatial Metadata Characteristics of the National and International Spatial Metadata Standards |
|
|
|
|
|
|
Sommario/riassunto |
|
This book represents years of work by the ICA Spatial Data Standards Commission during the 1995-2003 ICA cycles. It consists of an Introduction and six Regional Summary chapters that describe the spatial metadata activities happening in Europe, North America, Asia/Pacific, Latin America, Africa/Middle East, and the ISO community. These chapters provide the broader context and description of the milieu in which these standards operate, so that the reader can more easily understand the scientific and technical framework from whence a particular standard has emerged. The third section |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910483682503321 |
|
|
Titolo |
Financial Cryptography and Data Security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers / / edited by Ahmad-Reza Sadeghi |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2013.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVI, 406 p. 70 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 7859 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Data protection |
Electronic commerce |
Information technology - Management |
Cryptology |
Data and Information Security |
e-Commerce and e-Business |
Computer Application in Administrative Data Processing |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di contenuto |
|
Keynote -- Can Nature Help Us Solve Risk Management Issues? Position Paper -- Electronic Payment (Bitcoin) -- Quantitative Analysis of the Full Bitcoin Transaction Graph -- Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper) -- Evaluating User Privacy in Bitcoin -- Usability Aspects -- The Importance of Being Earnest [In Security Warnings] (Short Paper) -- Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing (Short Paper) -- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (Short Paper) -- Secure Computation -- Practical Fully Simulatable Oblivious Transfer with Sublinear Communication -- Unconditionally-Secure Robust Secret Sharing with Minimum Share Size -- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data -- Passwords |
|
|
|
|
|
|
|
|
|
|
|
-- “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks -- Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers -- Privacy Primitives and Non-repudiation -- Unique Ring Signatures: A Practical Construction (Short Paper) -- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency -- Accumulators and U-Prove Revocation (Short Paper) -- Anonymity -- Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy (Short Paper) -- P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (Short Paper) -- Hardware Security -- Coupon Collector’s Problem for Fault Analysis against AES – High Tolerance for Noisy Fault Injections (Short Paper) -- Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study (Short Paper) -- On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards (Short Paper) -- Secure Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic Searchable SymmetricEncryption -- GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits -- Invited Talk -- The Untapped Potential of Trusted Execution Environments on Mobile Devices: Extended Abstract -- Authentication Attacks and Countermeasures -- Stark: Tamperproof Authentication to Resist Keylogging -- Risks of Offline Verify PIN on Contactless Cards (Short Paper) -- How to Attack Two-Factor Authentication Internet Banking (Short Paper) -- CAge: Taming Certificate Authorities by Inferring Restricted Scopes (Short Paper) -- Privacy of Data and Communication -- Interdependent Privacy: Let Me Share Your Data -- A Secure Submission System for Online Whistle blowing Platforms (Short Paper) -- Securing Anonymous Communication Channels under the Selective DoS Attack (Short Paper) -- Private Data Retrieval -- PIRMAP: Efficient Private Information Retrieval for MapReduce -- Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates (Short Paper) -- Posters -- Three-Factor User Authentication Method Using Biometrics Challenge Response -- Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services -- Onions for Sale: Putting Privacy on the Market -- Searchable Encryption Supporting General Boolean Expression Queries -- A Privacy Preserving E-Payment Architecture -- Communication Services Empowered with a Classical Chaos Based Cryptosystem. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval. |
|
|
|
|
|
|
|
| |