This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014.
This book constitutes the refereed papers of the proceedings of the 8th International Conference on System Analysis and Modeling, SAM 2014, held in Valencia, Spain, in September 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Security, Privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013.
This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014.
This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Canada, in October 2014.
This book constitutes the refereed proceedings of the 17th International Conference on Model Driven Engineering Languages and Systems, MODELS 2014, held in Valencia, Spain, in September/October 2014.
This volume explores emerging research and pedagogy in analytics, collaboration, and decision support with an emphasis on business intelligence and social media.
This book constitutes the thoroughly refereed proceedings of the Third International Conference on Cloud Computing and Services Science, CLOSER 2013, held in Aachen, Germany, in May 2013.
This book constitutes the refereed proceedings of the five workshops that were organized in conjunction with the International Conference on Business Information Systems, BIS 2014, which took place in Larnaca, Cyprus, in May 2014.
This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014.
This book constitutes the proceedings of the 7th Euro Symposium on Systems Analysis and Design, SIGSAND/PLAIS 2014, held in Gdansk, Poland, in September 2014.
This book constitutes the proceedings of the 13th International Conference on Perspectives in Business Informatics Research, BIR 2014, held in Lund, Sweden, in September 2014.
This book contains 11 papers from the 8th Workshop on Global Sourcing, held in Val d'Isere, France, during March 23-26, 2014, which were carefully reviewed and selected from 42 submissions.
This book contains extended and revised versions of a set of selected papers from two workshops organized by the Euro Working Group on Decision Support Systems (EWG-DSS), which were held in Thessaloniki, Greece, and Rome, Italy, in May and July 2013.
This contributed volume is a result of discussions held at ABICT'13(4th International Workshop on Advances in Business ICT) in Krakow, September 8-11, 2013.
The book describes the science gateway building technology developed in the SCI-BUS European project and its adoption and customization method, by which user communities, such as biologists, chemists, and astrophysicists, can build customized, domain-specific science gateways.
This book provides essential insights on the adoption of modern software engineering practices at large companies producing software-intensive systems, where hundreds or even thousands of engineers collaborate to deliver on new systems and new versions of already deployed ones.
This book constitutes the refereed proceedings of the 7th International Conference on Software Language Engineering, SLE 2014, held in Vasteras, Sweden, in September 2014.
This book explores the premise that organizations are significantly influenced by their inter-organizational relationships; moreover, these relationships may generate important externalities, both positive and negative, impacting the environment at several levels.
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions.
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions.
This book constitutes the refereed proceedings of the first International Conference on Internet of Vehicles, IOV 2014, held in Beijing, China, in September 2014.
This book constitutes the refereed proceedings of the workshops held at the 16th Asia-Pacific Web Conference, APWeb 2014, in Changsha, China, in September 2014.
This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014.
This book presents and discusses the main strategic and organizational challenges posed by Big Data and analytics in a manner relevant to both practitioners and scholars.
This book reviews the challenging issues that present barriers to greater implementation of the cloud computing paradigm, together with the latest research into developing potential solutions.
This book constitutes the refereed proceedings of the 15th International Conference on Electronic Commerce and Web Technologies (EC-Web) held in Munich, Germany, in September 2014.
This book constitutes the joint refereed proceedings of the 14th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2014, and the 7th Conference on Internet of Things and Smart Spaces, ruSMART 2014, held in St.
In recent years, exchanges on both sides of the Atlantic have been extensively reengineered, and their organizational structures have changed from non-profit, membership organizations to for-profit, demutualized organizations.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Smart Grid Security, SmartGridSec 2014, held in Munich, Germany, in February 2014.
This book develops, evaluates and refines a cloud service relationship theory that explains how cloud users' uncertainties arise in these relationships and how they can be mitigated.
This book constitutes the refereed proceedings of the 7th International Workshop on Multiple Access Communications, MACOM 2014, held in Halmstad, Sweden, in August 2014.
This book constitutes the refereed proceedings of the Third International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2014, held in Munich, Germany, in September 2014, in conjunction with DEXA 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014.
This book constitutes the proceedings of the 12th International Conference on Business Process Management, BPM 2014, held in Haifa, Israel, in September 2014.
Throughout the book, theoretical foundations necessary for understanding Electronic Commerce (EC) are presented, ranging from consumer behavior to the economic theory of competition.
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks.
Customer value management is a managerial approach in which customers are perceived as the company's asset, the value of which may be measured and increased through the organization of processes around customer relationships.
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014.
This book presents a collection of research papers focusing on issues emerging from the interaction of information technologies and organizational systems.
This book constitutes the proceedings of the 10th European Conference on Modelling Foundations and Applications, ECMFA 2014, held as part of STAF 2014, in York, UK, in July 2014.
Traditionally, research on model-driven engineering (MDE) has mainly focused on the use of models at the design, implementation, and verification stages of development.