th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, during August 30 - September 2, 2006.
Information technology is a rapidly changing field in which researchers and developers must continuously set their vision on the next generation of technologies and the systems that they enable.
The 21st International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA-AIE 2008) held in Wroclaw, Poland was an international scientific forum for researchers in the field of applied artificial intelligence.
The fourth edition of the European Conference on Model-Driven Architecture - Foundations and Applications (ECMDA-FA 2008) was dedicated to furthering the state of knowledge and fostering the industrialization of the model-driven architecture (MDA) methodology.
This book contains the best papers from the International Conference on Web Inf- mation Systems and Technologies (WEBIST 2007), organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), endorsed by IW3C2, and held in Barcelona, Spain.
This volume contains the papers selected for presentation at the 17th Inter- tional Symposium on Methodologies for Intelligent Systems (ISMIS 2008), held in York University, Toronto, Canada, May 21-23, 2008.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Parallel Processing and Applied Mathematics, PPAM 2007, held in Gdansk, Poland, in September 2007.
Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems,- governmentapplicationsandsecureVPN.
The book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, DCOSS 2006, held in San Francisco, California, USA in June 2006.
In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development and use of advanced information te- nologies and systems for national and international security-related applications, has experienced tremendous growth and attracted substantial interest from academic - searchers in related fields as well as practitioners from both government agencies and industry.