This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences on Cooperative Information Systems (CoopIS 2008), Distributed Objects and Applications (DOA 2008), Grid computing, high performAnce and Distributed Applications (GADA 2008), Information Security (IS 2008), and Ontologies, Databases and Applications of Semantics (ODBASE 2008), held as OTM 2008 in Monterrey, Mexico, in November 2008.
This book contains the proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2008), held in Turin, Italy on 4-5 September 2008.
This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28-31, 2007 in Barcelona, Spain.
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), which took place in Cambridge, Massachusetts, USA on September 15-17.
This volume of the Lecture Notes in Computer Science series contains all papers th accepted for presentation at the 18 IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2007), which was held in the heart of Silicon Valley, San Jose, California, USA, on October 29-31, 2007.
This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St.
This book contains the best papers of the Second International Conference on E-business and Telecommunication Networks (ICETE), which was held, in 2005, at the Microsoft Research Centre - Reading, in the UK.
The Ubiquitous Computing conference series provides the premier forum in which to present original research results in all areas relating to the design, implementation, app- cation and evaluation of ubiquitous computing technologies.
This book contains the best papers of the Third International Conference on E-business and Telecommunications (ICETE), which was held in 2006 in Portugal.
This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC 2008, held in Oslo, Norway, in June 2008, co-located with UIC 2008, the 5th International Conference on Ubiquitous Intelligence and Computing.
This volume contains the proceedings of UIC 2008, the 5th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces.
Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), which was held in Hamburg, Germany, September 20-21, 2006, in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006).
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.
This book constitutes the refereed proceedings of the 6th International Conference on Wired/Wireless Internet Communications, WWIC 2008, held in Tampere, Finland, in May 2008.
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008.