top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in conceptual modeling : challenging perspectives ; ER 2009 Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS, Gramado, Brazil, November 9-12, 2009 ; proceedings / / Carlos Alberto Heuser, Gunther Pernul (eds.)
Advances in conceptual modeling : challenging perspectives ; ER 2009 Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS, Gramado, Brazil, November 9-12, 2009 ; proceedings / / Carlos Alberto Heuser, Gunther Pernul (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2009
Descrizione fisica 1 online resource (XIX, 358 p.)
Disciplina 005.74/3
Altri autori (Persone) HeuserCarlos Alberto
PernulG <1961-> (Gunther)
Collana Lecture notes in computer science
Soggetto topico Conceptual structures (Information theory)
Database design
Relational databases
ISBN 3-642-04947-8
Classificazione DAT 310f
DAT 600f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CoMoL 2009 – Conceptual Modeling in the Large -- Preface to CoMoL 2009 -- Semantic Service Design for Collaborative Business Processes in Internetworked Enterprises -- Algebraic Meta-structure Handling of Huge Database Schemata -- On Computing the Importance of Entity Types in Large Conceptual Schemas -- ETheCoM 2009 – First International Workshop on Evolving Theories of Conceptual Modelling -- Preface to ETheCoM 2009 -- Invited Talks -- Is It Important to Explain a Theorem? A Case Study on UML and -- Towards a Theory of Conceptual Modelling -- Accepted Papers -- Assessing Modal Aspects of OntoUML Conceptual Models in Alloy -- First-Order Types and Redundant Relations in Relational Databases -- On Matrix Representations of Participation Constraints -- Toward Formal Semantics for Data and Schema Evolution in Data Stream Management Systems -- XML Machines -- FP-UML 2009 – Fifth International Workshop on Foundations and Practices of UML -- Preface to FP-UML 2009 -- Dependability and Agent Modeling -- Applying AUML and UML 2 in the Multi-agent Systems Project -- A Collaborative Support Approach on UML Sequence Diagrams for Aspect-Oriented Software -- Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application -- Semantics Representation and Tools -- The MP (Materialization Pattern) Model for Representing Math Educational Standards -- XMI2USE: A Tool for Transforming XMI to USE Specifications -- MOST-ONISW 2009 – The Joint International Workshop on Metamodels, Ontologies, Semantic Technologies, and Information Systems for the Semantic Web -- Preface to MOST-ONISW 2009 -- Analysis Procedure for Validation of Domain Class Diagrams Based on Ontological Analysis -- Ontology for Imagistic Domains: Combining Textual and Pictorial Primitives -- Using a Foundational Ontology for Reengineering a Software Enterprise Ontology -- Multi-level Conceptual Modeling and OWL -- QoIS 2009 – The Fourth International Workshop on Quality of Information Systems -- Preface to QoIS 2009 -- Assessment of Data Quality Factors -- Completeness in Databases with Maybe-Tuples -- Modeling, Measuring and Monitoring the Quality of Information -- Tools for Information System Quality Assessment -- Evaluating the Functionality of Conceptual Models -- Qbox-Services: Towards a Service-Oriented Quality Platform -- RIGiM 2009 – Third International Workshop on Requirements, Intentions and Goals in Conceptual Modeling -- Preface to RIGiM 2009 -- Modelling -- A Comparison of Goal-Oriented Approaches to Model Software Product Lines Variability -- A Lightweight GRL Profile for i* Modeling -- Elicitation Issues -- From User Goals to Service Discovery and Composition -- ITGIM: An Intention-Driven Approach for Analyzing the IT Governance Requirements -- Adapting the i* Framework for Software Product Lines -- SECOGIS 2009 – Third International Workshop on Semantic and Conceptual Issues in Geographic Information Systems -- Preface to SeCoGIS 2009 -- Foundational Aspects -- A New Point Access Method Based on Wavelet Trees -- A Reference System for Topological Relations between Compound Spatial Objects -- A Model for Geographic Knowledge Extraction on Web Documents -- Semantical Aspects -- A Semantic Approach to Describe Geospatial Resources -- An Ontology-Based Framework for Geographic Data Integration -- A Semantic Approach for the Modeling of Trajectories in Space and Time.
Record Nr. UNINA-9910484294503321
Berlin ; ; New York, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust, privacy and security in digital business : 6th international conference; TrustBus 2009, Linz, Austria, September 3 - 4, 2009, proceedings / / Simone Fischer-Hubner, Costas Lambrinoudakis, Gunther Pernul (Eds.)
Trust, privacy and security in digital business : 6th international conference; TrustBus 2009, Linz, Austria, September 3 - 4, 2009, proceedings / / Simone Fischer-Hubner, Costas Lambrinoudakis, Gunther Pernul (Eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; Heidelberg ; ; New York, : Springer, c2009
Descrizione fisica 1 online resource (XII, 169 p.)
Disciplina 005.8
Altri autori (Persone) Fischer-HubnerSimone
LambrinoudakisCostas
PernulG <1961-> (Gunther)
Collana Lecture notes in computer science
Soggetto topico Computer security
Electronic commerce - Security measures
Business enterprises - Computer networks - Security measures
Computer networks - Security measures
Computer networks - Access control
ISBN 3-642-03748-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto User Profiling and Privacy in Digital Business -- User Profiling and Re-identification: Case of University-Wide Network Analysis -- Search Engines: Gateway to a New “Panopticon”? -- Privacy Enhancing Technologies and Identity Management -- Supporting Local Aliases as Usable Presentation of Secure Pseudonyms -- A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking -- An Anonymous Credit Card System -- Security and Privacy in Real Life Applications -- A Cluster-Based Framework for the Security of Medical Sensor Environments -- Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach -- A Formalization of HIPAA for a Medical Messaging System -- Reputation and Security Measurements -- Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems -- Steering Security through Measurement -- Advanced Features in Bayesian Reputation Systems -- Access Control -- An MDA-Based Environment for Generating Access Control Policies -- An Extended Role-Based Access Control Model for Delegating Obligations -- The OPL Access Control Policy Language -- Authentication and Authorisation -- Operational Semantics for DKAL: Application and Analysis -- HB???MAC: Improving the Random???HB # Authentication Protocol.
Altri titoli varianti TrustBus 2009
Record Nr. UNINA-9910484369403321
Berlin ; ; Heidelberg ; ; New York, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust, privacy, and security in digital business : second international conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005 : proceedings / / Sokratis Katsikas, Javier Lopez, Gunther Pernul (eds.)
Trust, privacy, and security in digital business : second international conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005 : proceedings / / Sokratis Katsikas, Javier Lopez, Gunther Pernul (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2005
Descrizione fisica 1 online resource (XII, 332 p.)
Disciplina 005.8
Altri autori (Persone) KatsikasSokratis K
LopezJavier
PernulG <1961-> (Gunther)
Collana Lecture notes in computer science
Soggetto topico Computer security
Public key infrastructure (Computer security)
Data transmission systems - Security measures
Electronic commerce - Security measures
Business enterprises - Computer networks - Security measures
Classificazione 54.81
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Privacy Enhanced Technologies: Methods – Markets – Misuse -- Digital Business -- Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains -- Protection Mechanisms Against Phishing Attacks -- Dropout-Tolerant TTP-Free Mental Poker -- A Self-healing Mechanism for an Intrusion Tolerance System -- Protecting Online Rating Systems from Unfair Ratings -- Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP -- Designing Secure E-Tendering Systems -- Mobile/Wireless Services -- A Multilateral Secure Payment System for Wireless LAN Hotspots -- Secure Group Communications over Combined Wired and Wireless Networks -- A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms -- Making Money with Mobile Qualified Electronic Signatures -- Certificate Revocation/Index Search -- Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT) -- Secure Index Search for Groups -- Trust -- Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations -- Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security -- The Fuzzy and Dynamic Nature of Trust -- Towards an Ontology of Trust -- Digital Signature -- An Improved Group Signature Scheme -- Efficient Member Revocation in Group Signature Schemes -- Conditional Digital Signatures -- A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions -- Privacy -- Privacy Enforcement for IT Governance in Enterprises: Doing It for Real -- An Adaptive Privacy Management System for Data Repositories -- Privacy Preserving Data Mining Services on the Web -- Reading Your Keystroke: Whose Mail Is It? -- E-Auctions -- A Novel Construction of Two-Party Private Bidding Protocols from Yao’s Millionaires Problem -- An Improved Double Auction Protocol Against False Bids -- An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions -- Smart Cards/Authentication -- A Secure Fingerprint Authentication System on an Untrusted Computing Environment -- Security Enhancement for Password Authentication Schemes with Smart Cards -- Securing Operating System Services Based on Smart Cards.
Altri titoli varianti TrustBus 2005
Record Nr. UNINA-9910484744403321
Berlin ; ; New York, : Springer, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui