01149nam0-22003371i-450-99000739622040332120060707090604.02-7283-0271-5000739622FED01000739622(Aleph)000739622FED0100073962220030228d1993----km-y0itay50------bafreITj-------001yyExercice du pouvoir et continuité gentilice: les Acilii Glabrionesdu IIIe siècle av. J.-C. au Ve siècle ap. J.-C.Monique Dondin-PayreRomeÉcole française de Rome1993XI, 382 p.24 cmCollection de l'École française de Rome0223-5099180340.5420itaDondin-Payre,Monique267403ITUNINARICAUNIMARCBK990007396220403321DDR-XXII A 501 (al.es. 1)3217 ddrDDR21-3901DDR-XXII A 5013961 ddrDDR21-6913DDR-XXXI A 2153217DDRDDRExercice du pouvoir et continuité gentilice: les Acilii Glabriones691747UNINA04398nam 2200685 a 450 991048316630332120200520144314.03-540-37752-210.1007/11824633(CKB)1000000000284041(SSID)ssj0000320507(PQKBManifestationID)11937788(PQKBTitleCode)TC0000320507(PQKBWorkID)10248454(PQKB)10435313(DE-He213)978-3-540-37752-8(MiAaPQ)EBC3068131(PPN)123137616(EXLCZ)99100000000028404120060719d2006 uy 0engurnn#008mamaatxtccrTrust, privacy, and security in digital business third international conference, TrustBus 2006, Krakow, Poland, September 2006 : proceedings /Simone Fischer-Hubner, Steven Furnell, Costas Lambrinoudakis (eds.)1st ed. 2006.Berlin ;New York Springerc20061 online resource (XIV, 250 p.)Lecture notes in computer science,0302-9743 ;4083LNCS sublibrary. SL 4, Security and cryptologyBibliographic Level Mode of Issuance: Monograph3-540-37750-6 Includes bibliographical references and index.Privacy and identity management -- Security and risk management -- Security requirements and development -- Privacy enhancing technologies and privacy management -- Access control models -- Trust and reputation -- Security protocols -- Security and privacy in mobile environments.This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of “Building the Information Assurance Community of Purpose”, and by Günter Karjoth from IBM Research - Zurich, with a talk entitled “Privacy Practices and Economics –– From Privacy Policies to Privacy SLAs. ” The subject of the panel discussion was “Is Security Without Trust Feasible?” chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews.Lecture notes in computer science ;4083.LNCS sublibrary.SL 4,Security and cryptology.TrustBus 2006Public key infrastructure (Computer security)CongressesData transmission systemsSecurity measuresCongressesElectronic commerceSecurity measuresCongressesBusiness enterprisesComputer networksSecurity measuresCongressesComputer securityCongressesPublic key infrastructure (Computer security)Data transmission systemsSecurity measuresElectronic commerceSecurity measuresBusiness enterprisesComputer networksSecurity measuresComputer security005.8Fischer-Hubner Simone552818Furnell Steven1970-846860Lambrinoudakis Costas1731902MiAaPQMiAaPQMiAaPQBOOK9910483166303321Trust, privacy, and security in digital business4190016UNINA05658nam 2200733Ia 450 991101950200332120200520144314.09786611842888978128184288612818428859783527615674352761567997835276156673527615660(CKB)1000000000552489(EBL)481384(SSID)ssj0000097642(PQKBManifestationID)11130869(PQKBTitleCode)TC0000097642(PQKBWorkID)10119879(PQKB)11699598(MiAaPQ)EBC481384(OCoLC)214281307(Perlego)2750115(EXLCZ)99100000000055248919941020d1995 uy 0engur|n|---|||||txtccrAdvanced computer-assisted techniques in drug discovery /edited by Han van de WaterbeemdWeinheim ;New York VCHc19951 online resource (367 p.)Methods and principles in medicinal chemistry ;v. 3Description based upon print version of record.9783527292486 3527292489 Includes bibliographical references and index.Advanced Computer- Assisted Techniques in Drug Discovery; Preface; A Personal Foreword; Contents; 1 Introduction; 1.1 3D QSAR; 1.2 Databases; 1.3 Progress in Multivariate Data Analysis; 1.4 Scope of this Book; References; 2 3D QSAR: The Integration of QSAR with Molecular Modeling; 2.1 Chemometrics and Molecular Modeling; 2.1.1 Introduction; 2.1.2 QSAR Methodology using Molecular Modeling and Chemometrics; 2.1.2.1 Search for the Geometric Pharmacophore; 2.1.2.2 Quantitative Correlation between Molecular Properties and Activity; 2.1.2.3 Computer Programs; 2.1.3 Illustrative Examples2.1.3.1 Amnesia-Reversal Compounds2.1.3.2 Non-Peptide Angiotensin II Receptor Antagonists; 2.1.3.3 HMG-CoA Reductase Inhibitors; 2.1.3.4 Antagonists at the 5-HT3 Receptor; 2.1.3.5 Polychlorinated Dibenzo-p-dioxins; 2.1.4 Conclusions; References; 2.2 3D QSAR Methods; 2.2.1 Introduction; 2.2.2 3D QSAR of a Series of Calcium Channel Agonists; 2.2.2.1 Molecular Alignment; 2.2.2.2 Charges; 2.2.2.3 Generating 3D Fields; 2.2.2.4 Compilation of GRID Maps; 2.2.2.5 Inclusion of Macroscopic Descriptors with 3D Field Data; 2.2.3 Statistical Analysis; 2.2.3.1 Results of the Analysis2.2.3.2 Testing the Model2.2.4 Conclusions; References; 2.3 GOLPE Philosophy and Applications in 3D QSAR; 2.3.1 Introduction; 2.3.1.1 3D Molecular Descriptors and Chemometric Tools; 2.3.1.2 Unfolding Three-way Matrices; 2.3.2 The GOLPE Philosophy; 2.3.2.1 Variable Selection; 2.3.3 Applications; 2.3.3.1 PCA on the Target Matrix; 2.3.3.2 PCA on the Probe Matrix; 2.3.3.3 PLS Analysis on the Target Matrix; 2.3.3.4 PLS on Target Matrix as a Strategy to Ascertain the Active Conformation; 2.3.3.5 GOLPE with Different 3D Descriptors; 2.3.4 Conclusions and Perspectives; References3 Rational Use of Chemical and Sequence Databases3.1 Molecular Similarity Analysis: Applications in Drug Discovery; 3.1.1 Introduction; 3.1.2 Similarity-Based Compound Selection; 3.1.2.1 Similarity Measures and Neighborhoods; 3.1.2.2 Application of 2D and 3D Similarity Measures; 3.1.2.3 Application of Dissimilarity-Based Compound Selection for Broad Screening; 3.1.3 Structure-Activity Maps (SAMs); 3.1.3.1 A Visual Analogy; 3.1.3.2 Representing Inter-Structure Distances; 3.1.3.3 Structure Maps; 3.1.3.4 Coloring a Structure Map; 3.1.4 Field-Based Similarity Methods3.1.4.1 Field-Based Similarity Measures3.1.4.2 Field-Based Molecular Superpositions; 3.1.4.3 An Example of Field-Based Fitting: Morphine and Clonidine; 3.1.5 Conclusions; References; 3.2 Clustering of Chemical Structure Databases for Compound Selection; 3.2.1 Introduction; 3.2.2 Review of Clustering Methods; 3.2.2.1 Hierarchical Clustering Methods; 3.2.2.2 Non-Hierarchical Clustering Methods; 3.2.3 Choice of Clustering Method; 3.2.3.1 Computational Requirements; 3.2.3.2 Cluster Shapes; 3.2.3.3 Comparative Studies3.2.4 Examples of the Selection of Compounds from Databases by Clustering TechniquesThe use of powerful computers has revolutionized molecular design and drug discovery. Thoroughly researched and well-structured, this comprehensive handbook covers highly effective and efficient techniques in 3D-QSAR and advanced statistical analysis. The emphasis is on showing users how to apply these methods and avoid costly and time-consuming methodical errors.Topics covered include* combination of statistical methods and molecular modeling tools* rational use of databases* advanced statistical techniques* neural networks and expert systems in molecular design<brMethods and principles in medicinal chemistry ;vv. 3.Pharmaceutical chemistryData processingDrugsDesignData processingDrugsResearchData processingQSAR (Biochemistry)Pharmaceutical chemistryData processing.DrugsDesignData processing.DrugsResearchData processing.QSAR (Biochemistry)615/.19/00285Waterbeemd Han van de860600MiAaPQMiAaPQMiAaPQBOOK9911019502003321Advanced computer-assisted techniques in drug discovery1928521UNINA