Overview
- State-of-the-art research
- Fast-track conference proceedings
- Unique visibility
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8127)
Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)
Included in the following conference series:
Conference proceedings info: CD-ARES 2013.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (36 papers)
-
Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013)
-
Economic, Ethical, Legal, Multilingual, Organizational and Social Aspects
-
Data / Information Management as a Service
-
Context-Oriented Information Integration and Location-Aware Computing
-
Risk Management and Business Continuity
-
Security and Privacy and Location Based Applications
-
Other volumes
-
Availability, Reliability, and Security in Information Systems and HCI
-
Security Engineering and Intelligence Informatics
Keywords
About this book
Editors and Affiliations
Bibliographic Information
Book Title: Availability, Reliability, and Security in Information Systems and HCI
Book Subtitle: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings
Editors: Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-40511-2
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: IFIP International Federation for Information Processing 2013
Softcover ISBN: 978-3-642-40510-5Published: 21 August 2013
eBook ISBN: 978-3-642-40511-2Published: 19 August 2013
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVI, 504
Number of Illustrations: 156 b/w illustrations
Topics: Information Systems Applications (incl. Internet), Systems and Data Security, Information Storage and Retrieval, Cryptology, e-Commerce/e-business, IT in Business