Skip to main content
  • Conference proceedings
  • © 2012

Multidisciplinary Research and Practice for Informations Systems

IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Conference proceedings info: CD-ARES 2012.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (49 papers)

  1. Front Matter

  2. Conference

    1. Cross-Domain Applications: Aspects of Modeling and Validation

      1. Ontology-Based Identification of Research Gaps and Immature Research Areas
        • Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek
        Pages 1-16
      2. A Context-Aware Mashup Integration Guideline for Enterprise 2.0
        • Gerald Bader, Amin Anjomshoaa, A Min Tjoa
        Pages 17-30
      3. Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline Blends
        • Mostafa Kiani Deh Kiani, Barat Ghobadian, Fathollah Ommi, Gholamhassan Najafi, Talal Yusaf
        Pages 31-43
      4. Validation of XML Documents with SWRL
        • Jesús M. Almendros-Jiménez
        Pages 44-57
      5. A Taxonomy of Dirty Time-Oriented Data
        • Theresia Gschwandtner, Johannes Gärtner, Wolfgang Aigner, Silvia Miksch
        Pages 58-72
    2. Trust, Security, Privacy and Safety

      1. A Foundation for Requirements Analysis of Privacy Preserving Software
        • Kristian Beckers, Maritta Heisel
        Pages 93-107
      2. On Complexity Reduction of User Interfaces for Safety-Critical Systems
        • Andreas Holzinger, Evgenia Popova, Bernhard Peischl, Martina Ziefle
        Pages 108-122
      3. Security SLAs – An Idea Whose Time Has Come?
        • Martin Gilje Jaatun, Karin Bernsmed, Astrid Undheim
        Pages 123-130
      4. A Formal Equivalence Classes Based Method for Security Policy Conformance Checking
        • Eckehard Hermann, Udo Litschauer, Jürgen Fuß
        Pages 146-160
      5. Trust as an Organismic Trait of E-Commerce Systems
        • Tanja Ažderska, Borka Jerman Blažič
        Pages 161-175
    3. Mobile Applications

      1. Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives
        • Mersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla, Athanasios Tsakalidis
        Pages 190-202
    4. Data Processing and Management

      1. Near Duplicate Document Detection for Large Information Flows
        • Daniele Montanari, Piera Laura Puglisi
        Pages 203-217
      2. TinyStream Sensors
        • Pedro Furtado
        Pages 218-232
      3. Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data
        • Hiroshi Sato, Hisashi Kurasawa, Takeru Inoue, Motonori Nakamura, Hajime Matsumura, Keiichi Koyanagi
        Pages 233-243
    5. Retrieval and Complex Query Processing

      1. Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language Modeling
        • Rachid Aknouche, Ounas Asfari, Fadila Bentayeb, Omar Boussaid
        Pages 244-258

Other Volumes

  1. Multidisciplinary Research and Practice for Information Systems

About this book

This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and validation; trust,security, privacy, and safety; mobile applications; data processing and management; retrieval and complex query processing; e-commerce; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012.

Editors and Affiliations

  • Department of IT, Engineering and Environment, University of South Australia, Adelaide, Australia

    Gerald Quirchmayr

  • Department of Information Technologies, University of Economics, Prague 3, Czech Republic

    Josef Basl

  • School of Information Science, Korean Bible University, Seoul, Korea

    Ilsun You

  • Information Technology and Decision Sciences, Old Dominion University, Norfolk, USA

    Lida Xu

  • Institute of Software Technology and Interactive Systems, Vienna University of Technology and SBA Research, Vienna, Austria

    Edgar Weippl

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access