05008nam 22006495 450 99646550830331620200705010800.03-642-45204-310.1007/978-3-642-45204-8(CKB)3710000000078876(DE-He213)978-3-642-45204-8(SSID)ssj0001091019(PQKBManifestationID)11618087(PQKBTitleCode)TC0001091019(PQKBWorkID)11025713(PQKB)10695067(MiAaPQ)EBC3093176(PPN)176117903(EXLCZ)99371000000007887620131212d2013 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierInformation Systems Security[electronic resource] 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings /edited by Aditya Bagchi, Indrakshi Ray1st ed. 2013.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2013.1 online resource (XVI, 404 p. 70 illus.) Security and Cryptology ;8303Bibliographic Level Mode of Issuance: Monograph3-642-45203-5 Challenges and Opportunities for Security with Differential Privacy -- An Encrypted In-Memory Column-Store: The Onion Selection Problem -- Risk Aware Approach to Data Confidentiality in Cloud Computing -- Jamming Resistant Schemes for Wireless Communication -- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card -- Signcryption from Randomness Recoverable PKE Revisited -- Auctions with Rational Adversary -- A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services -- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach -- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management -- Secure States versus Secure Executions - From Access Control to Flow Control -- Monitoring for Slow Suspicious Activities Using a Target Centric Approach -- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers -- Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing -- Web Services Based Attacks against Image CAPTCHAs -- New Long-Term Glimpse of RC4 Stream Cipher -- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs -- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols -- Information Theoretical Analysis of Side-Channel Attack -- Efficient Multi-bit Image Steganography in Spatial Domain -- Evolutionary Multibit Grouping Steganographic Algorithm -- Let the Right One in: Discovering and Mitigating Permission Gaps -- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET -- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption -- Error Correction of Partially Exposed RSA Private Keys from MSB Side -- Efficient Enforcement of Privacy for Moving Object Trajectories -- An Administrative Model for Spatio-Temporal Role Based Access Control -- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm.This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.Security and Cryptology ;8303Computer securityData encryption (Computer science)Computer communication systemsSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Computer security.Data encryption (Computer science).Computer communication systems.Systems and Data Security.Cryptology.Computer Communication Networks.005.8Bagchi Adityaedthttp://id.loc.gov/vocabulary/relators/edtRay Indrakshiedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465508303316Information Systems Security771916UNISA04119nam 2200433 450 991058349890332120200108200849.00-12-802785-10-12-802786-X(CKB)4100000003836585(MiAaPQ)EBC5394952(PPN)233903437(EXLCZ)99410000000383658520180601d2018 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAccelerated predictive stability fundamentals and pharmaceutical industry practices /edited by Fenghe Qiu, Garry ScrivensSan Diego, California :Elsevier,2018.1 online resource (514 pages)Part I. General chapters -- Accelerated predictive stability: an introduction -- Regulatory expectations and industry practice on stability testing -- Theory and fundamentals of accelerated predictive stability (APS) studies -- Practical considerations -- The humidity exposure of packaged products -- Data evaluation and statistical methods -- Strategies for improving the reliability of accelerated predictive stability (APS) studies -- Integration of APS into a rapid, early clinical drug product development paradigm -- Accelerated predictive stability (APS) regulatory strategies -- Embedding APS within business -- Implementing an accelerated predictive stability program -- Part II. Industry practices -- Accelerated stability assessment program (ASAP) applications in a postapproval environment -- ASAP application: unstable drug candidate in early development -- ASAP application in suspension, liquid, lyophilized, and controlled-release drug products -- Applications of ASAP to generic drugs -- ASAP application: nicotine lozenges -- ASAP applications in clinical development: prediction of degradation and dissolution performance -- Accelerated predictive stability (APS) applications: packaging strategies for controlling dissolution performance -- Accelerated stability modeling: investigation of disintegration time of a drug product with sodium bicarbonate -- Accelerated stability modeling: an ionic liquid drug product -- Accelerated stability modeling: assay loss of nicotine lozenges -- Accelerated stability modeling: desolvation of a solvate drug product."Accelerated Predictive Stability (APS): Fundamentals and Pharmaceutical Industry Practices provides coverage of both the fundamental principles and pharmaceutical industry applications of the APS approach. Fundamental chapters explain the scientific basis of the APS approach, while case study chapters from many innovative pharmaceutical companies provide a thorough overview of the current status of APS applications in the pharmaceutical industry. In addition, up-to-date experiences in utilizing APS data for regulatory submissions in many regions and countries highlight the potential of APS in support of registration stability testing for certain regulatory submissions. This book provides high level strategies for the successful implementation of APS in a pharmaceutical company. It offers scientists and regulators a comprehensive resource on how the pharmaceutical industry can enhance their understanding of a product's stability and predict drug expiry more accurately and quickly. Provides a comprehensive, one-stop-shop resource for accelerated predictive stability (APS). Presents the scientific basis of different APS models. Includes the applications and utilities of APS that are demonstrated through numerous case studies. Covers up-to-date regulatory experience"--Provided by publisher.Drug stabilityPharmaceutical industryDrug stability.Pharmaceutical industry.615.18Qiu Fenghe889911Qiu FengheScrivens GarryMiAaPQMiAaPQMiAaPQBOOK9910583498903321Accelerated predictive stability1988306UNINA