05812oam 2200601 450 99646595160331620210723131525.01-280-95652-697866109565243-540-48054-410.1007/3-540-48054-4(CKB)1000000000548778(EBL)3061620(SSID)ssj0000288097(PQKBManifestationID)11207964(PQKBTitleCode)TC0000288097(PQKBWorkID)10373715(PQKB)11777839(DE-He213)978-3-540-48054-9(MiAaPQ)EBC3061620(MiAaPQ)EBC6489828(PPN)15522946X(EXLCZ)99100000000054877820210723d1999 uy 0engur|n|---|||||txtccrAdvances in conceptual modeling ER'99 Workshops on Evolution and Change in Data Management, Reverse Engineering in Information Systems, and the World Wide Web and Conceptual Modeling Paris, France, November 15-18, 1999, proceedings /Peter P. Chen [and four others] (Eds.)1st ed. 1999.Berlin ;Heidelberg :Springer,[1999]©19991 online resource (401 p.)Lecture Notes in Computer Science ;1727Description based upon print version of record.3-540-66653-2 Includes bibliographical references (p. 387) and index.First International Workshop on Evolution and Change in Data Management (ECDM’99) -- Handling Evolving Data Through the Use of a Description Driven Systems Architecture -- Evolution of Schema and Individuals of Configurable Products -- Updates and Application Migration Support in an ODMG Temporal Extension -- ODMG Language Extensions for Generalized Schema Versioning Support -- Transposed Storage of an Object Database to Reduce the Cost of Schema Changes -- A Survey of Current Methods for Integrity Constraint Maintenance and View Updating -- Specification and Implementation of Temporal Databases in a Bitemporal Event Calculus -- Schema Versioning for Archives in Database Systems -- Modeling Cyclic Change -- On the Ontological Expressiveness of Temporal Extensions to the Entity-Relationship Model -- Semantic Change Patterns in the Conceptual Schema -- International Workshop on Reverse Engineering in Information Systems (REIS’99) -- The BRIDGE: A Toolkit Approach to Reverse Engineering System Metadata in Support of Migration to Enterprise Software -- Data Structure Extraction in Database Reverse Engineering -- Documenting Legacy Relational Databases -- Relational Database Reverse Engineering -- A Tool to Reengineer Legacy Systems to Object-Oriented Systems -- CAPPLES — A Capacity Planning and Performance Analysis Method for the Migration of Legacy Systems -- Reuse of Database Design Decisions -- International Workshop on the World Wide Web and Conceptual Modeling (WWWCM’99) -- Modeling Interactive Web Sources for Information Mediation -- Web Application Models Are More than Conceptual Models -- E/R Based Scenario Modeling for Rapid Prototyping of Web Information Services -- Models for Superimposed Information -- Formalizing the Specification of Web Applications -- “Modeling-by-Patterns” of Web Applications -- A Unified Framework for Wrapping, Mediating and Restructuring Information from the Web -- Semantically Accessing Documents Using Conceptual Model Descriptions -- Knowledge Discovery for Automatic Query Expansion on the World Wide Web -- KnowCat: A Web Application for Knowledge Organization -- Meta-modeling for Web-Based Teachware Management -- Data Warehouse Design for E-Commerce Environments.The objective of the workshops associated with the ER'99 18th International Conference on Conceptual Modeling is to give participants access to high level presentations on specialized, hot, or emerging scientific topics. Three themes have been selected in this respect: — Evolution and Change in Data Management (ECDM'99) dealing with han­ dling the evolution of data and data structure, — Reverse Engineering in Information Systems (REIS'99) aimed at exploring the issues raised by legacy systems, — The World Wide Web and Conceptual Modehng (WWWCM'99) which ana­ lyzes the mutual contribution of WWW resources and techniques with con­ ceptual modeling. ER'99 has been organized so that there is no overlap between conference ses­ sions and the workshops. Therefore participants can follow both the conference and the workshop presentations they are interested in. I would like to thank the ER'99 program co-chairs, Jacky Akoka and Mokrane Bouzeghoub for having given me the opportunity to organize these workshops. I would also like to thank Stephen Liddle for his valuable help in managing the evaluation procedure for submitted papers and helping to prepare the workshop proceedings for publication. August 1999 Jacques Kouloumdjian Preface for ECDM'99 The first part of this volume contains the proceedings of the First International Workshop on Evolution and Change in Data Management, ECDM'99, which was held in conjunction with the 18th International Conference on Conceptual Modehng (ER'99) in Paris, France, November 15-18, 1999.Lecture notes in computer science ;1727.Computer scienceCongressesComputer science004Chen Peter P. S.International Conference on Conceptual Modeling(18th :1999 :Paris, France)MiAaPQMiAaPQUtOrBLWBOOK996465951603316Advances in Conceptual Modeling2239829UNISA03531nam 22007455 450 991048499370332120251225211030.03-662-54970-010.1007/978-3-662-54970-4(CKB)4340000000061667(DE-He213)978-3-662-54970-4(MiAaPQ)EBC6298687(MiAaPQ)EBC5594580(Au-PeEL)EBL5594580(OCoLC)988029132(PPN)201471329(EXLCZ)99434000000006166720170516d2017 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierFinancial Cryptography and Data Security 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers /edited by Jens Grossklags, Bart Preneel1st ed. 2017.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2017.1 online resource (XIV, 620 p. 135 illus.)Security and Cryptology,2946-1863 ;9603Includes index.3-662-54969-7 Fraud and deception -- Payments, auctions, and e-voting -- Multiparty computation -- Mobile malware -- Social interaction and policy -- Cryptanalysis -- Surveillance and anonymity -- Web security and data privacy -- Bitcoin mining -- Cryptographic protocols -- Payment use and abuse.This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016. The 27 revised full papers and 9 short papers were carefully selected and reviewed from 137 full papers submissions. The papers are grouped in the following topical sections: fraud and deception; payments, auctions, and e-voting; multiparty computation; mobile malware; social interaction and policy; cryptanalysis; surveillance and anonymity; Web security and data privacy; Bitcoin mining; cryptographic protocols; payment use and abuse.Security and Cryptology,2946-1863 ;9603CryptographyData encryption (Computer science)Data protectionElectronic commerceInformation technologyManagementComputer networksCryptologyData and Information Securitye-Commerce and e-BusinessComputer Application in Administrative Data ProcessingComputer Communication NetworksCryptography.Data encryption (Computer science).Data protection.Electronic commerce.Information technologyManagement.Computer networks.Cryptology.Data and Information Security.e-Commerce and e-Business.Computer Application in Administrative Data Processing.Computer Communication Networks.005.82Grossklags Jensedthttp://id.loc.gov/vocabulary/relators/edtPreneel Bartedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484993703321Financial Cryptography and Data Security2960333UNINA