LEADER 06284nam 22009015 450 001 9910483688703321 005 20201109121130.0 010 $a3-319-12778-0 024 7 $a10.1007/978-3-319-12778-1 035 $a(CKB)3710000000269713 035 $a(SSID)ssj0001372639 035 $a(PQKBManifestationID)11881979 035 $a(PQKBTitleCode)TC0001372639 035 $a(PQKBWorkID)11310407 035 $a(PQKB)10195923 035 $a(DE-He213)978-3-319-12778-1 035 $a(MiAaPQ)EBC6303657 035 $a(MiAaPQ)EBC5595108 035 $a(Au-PeEL)EBL5595108 035 $a(OCoLC)1076258172 035 $a(PPN)182098001 035 $a(EXLCZ)993710000000269713 100 $a20141021d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFuture Data and Security Engineering $e1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings /$fedited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XVI, 312 p. 103 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8860 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-12777-2 327 $aOn Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations -- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets -- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation -- An Efficient Similarity Search in Large Data Collections with MapReduce -- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus -- Constructing Private Indexes on Encrypted Data for Outsourced Databases -- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis -- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection -- De-anonymising Set-Generalised Transactions Based on Semantic Relationships -- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System -- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing -- Link Prediction in Social Networks Based on Local Weighted Paths -- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base -- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices -- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA -- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator -- Smart Card Based User Authentication Scheme with Anonymity -- Cloud-Based ERP Solution for Modern Education in Vietnam -- Heuristics for Energy-Aware VM Allocation in HPC Clouds -- Information-Flow Analysis of Hibernate Query Language -- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface -- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases -- Towards a Semantic Linked Data Retrieval Model. 330 $aThis book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8860 606 $aManagement information systems 606 $aComputer science 606 $aComputer security 606 $aInformation storage and retrieval 606 $aData encryption (Computer science) 606 $aDatabase management 606 $aAlgorithms 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer security. 615 0$aInformation storage and retrieval. 615 0$aData encryption (Computer science). 615 0$aDatabase management. 615 0$aAlgorithms. 615 14$aManagement of Computing and Information Systems. 615 24$aSystems and Data Security. 615 24$aInformation Storage and Retrieval. 615 24$aCryptology. 615 24$aDatabase Management. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aDang$b Tran Khanh$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWagner$b Roland$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNeuhold$b Erich J$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTakizawa$b Makoto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKüng$b Josef$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aThoai$b Nam$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483688703321 996 $aFuture data and security engineering$91985658 997 $aUNINA