Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA,… - OTM Confederated

On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS

OTM Confederated International Conferences, CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II

Tari, Zahir (Ed.)

2007, XXIX, 1860 p.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-3-540-76843-2

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-540-76835-7

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

This two-volume set LNCS 4803/4804 constitutes the refereed proceedings of the five confederated international conferences on Cooperative Information Systems (CoopIS 2007), Distributed Objects and Applications (DOA 2007), Ontologies, Databases and Applications of Semantics (ODBASE 2007), Grid computing, high performance and Distributed Applications (GADA 2007), and Information Security (IS 2007) held as OTM 2007 in Vilamoura, Portugal, in November 2007.

The 95 revised full and 21 revised short papers presented together with five keynote talks were carefully reviewed and selected from a total of 362 submissions.

Corresponding with the five OTM 2007 main conferences CoopIS, ODBASE, GADA, and DOA, the papers include topical sections on process analysis and semantics, process modeling, P2P, collaboration, business transactions, dependability and security, middleware and web services, aspects and development tools, mobility and distributed algorithms, frameworks, patterns, and testbeds, ontology mapping, semantic querying, ontology development, learning and text mining, annotation and metadata management, ontology applications, data and storage, networks, and many mo

Content Level » Research

Keywords » ARC - Monitor - Web-based systems - Workflow Management - access control - algorithms - aspect-oriented programming - business process management - cooperative systems - data security - database - distributed systems - genetic algorithms - networks - social networks

Related subjects » Communication Networks - Database Management & Information Retrieval - HCI - Security and Cryptology

Table of contents 

GADA 2007 International Conference (Grid Computing, High-Performance and Distributed Applications).- GADA 2007 PC Co-chairs’ Message.- Service Architectures for e-Science Grid Gateways: Opportunities and Challenges.- Access Control Management in Open Distributed Virtual Repositories and the Grid.- Transforming the Adaptive Irregular Out-of-Core Applications for Hiding Communication and Disk I/O.- Adaptive Data Block Placement Based on Deterministic Zones (AdaptiveZ).- Keyword Based Indexing and Searching over Storage Resource Broker.- eCube: Hypercube Event for Efficient Filtering in Content-Based Routing.- Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants.- A Service-Oriented Platform for the Enhancement and Effectiveness of the Collaborative Learning Process in Distributed Environments.- Social Networking to Support Collaboration in Computational Grids.- A Policy Based Approach to Managing Shared Data in Dynamic Collaborations.- Grid Service Composition in BPEL for Scientific Applications.- Efficient Management of Grid Resources Using a Bi-level Decision-Making Architecture for “Processable” Bulk Data.- Towards an Open Grid Marketplace Framework for Resources Trade.- A Hybrid Algorithm for Scheduling Workflow Applications in Grid Environments (ICPDP).- Contention-Free Communication Scheduling for Group Communication in Data Parallelism.- SNMP-Based Monitoring Agents and Heuristic Scheduling for Large-Scale Grids.- HARC: The Highly-Available Resource Co-allocator.- Assessing a Distributed Market Infrastructure for Economics-Based Service Selection.- Grid Problem Solving Environment for Stereology Based Modeling.- Managing Dynamic Virtual Organizations to Get Effective Cooperation in Collaborative Grid Environments.- Sidera: A Cluster-Based Server for Online Analytical Processing.- Parallel Implementation of a Neural Net Training Application in a Heterogeneous Grid Environment.- Generalized Load Sharing for Distributed Operating Systems.- An Application-Level Service Control Mechanism for QoS-Based Grid Scheduling.- Fine Grained Access Control with Trust and Reputation Management for Globus.- Vega: A Service-Oriented Grid Workflow Management System.- Information Security (IS) 2007 International Symposium.- IS 2007 PC Co-chairs’ Message.- Cryptography: Past, Present and Future.- E-Passport: Cracking Basic Access Control Keys.- Managing Risks in RBAC Employed Distributed Environments.- STARBAC: Spatiotemporal Role Based Access Control.- Authentication Architecture for eHealth Professionals.- On RSN-Oriented Wireless Intrusion Detection.- A Hybrid, Stateful and Cross-Protocol Intrusion Detection System for Converged Applications.- Toward Sound-Assisted Intrusion Detection Systems.- End-to-End Header Protection in Signed S/MIME.- Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors.- A Multi-core Security Architecture Based on EFI.- Intelligent Home Network Authentication: Home Device Authentication Using Device Certification.- Bayesian Analysis of Secure P2P Sharing Protocols.- Network Coding Protocols for Secret Key Distribution.- 3-Party Approach for Fast Handover in EAP-Based Wireless Networks.- SWorD– A Simple Worm Detection Scheme.- Prevention of Cross-Site Scripting Attacks on Current Web Applications.- Compiler Assisted Elliptic Curve Cryptography.- Trust Management Model and Architecture for Context-Aware Service Platforms.- Mobile Agent Protection in E-Business Application A Dynamic Adaptability Based Approach.- Business Oriented Information Security Management – A Layered Approach.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Structures, Cryptology and Information Theory.