This book constitutes the proceedings of the Third International IFIP Working Conference on Enterprise Interoperability (IWEI 2011) , held in Stockholm, Sweden, March 23-24, 2011.
This volume constitutes the proceedings of the 5th International Conference on E-Technologies, MCETECH 2011, held in Les Diablerets, Switzerland, January 23-26, 2011.
This book contains substantially extended and revised versions of the best papers from the 12th International Conference on Enterprise Information Systems (ICEIS 2010), held in Funchal, Madeira, Portugal, June 8-12, 2010.
This book constitutes the joint refereed proceedings of the Third International Workshop on Communication Technologies for Vehicles, Nets4Cars 2011and the First International Workshop on Communication Technologies for Vehicles in the Railway Transportation, Nets4Trains 2011, held in Oberpfaffenhofen, Germany, in March 2011.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010.
This book constitutes the refereed proceedings of two workshops held in conjunction with the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, in Crete, Greece, in June 2011.
This book constitutes the refereed proceedings of the 4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, March 29-31, 2011.
This book constitutes the refereed proceedings of the 12th International Conference on Passive and Active Measurement, PAM 2011, held in Atlanta, GA, USA, in March 2011.
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on Web Services and Formal Methods, WS-FM 2010, held in Hoboken, NJ, USA, in September 2010.
This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates.
This book constitutes the joint post-proceedings of four topical workshops heldas satellite meetings of the 8th International Conference on service-orientedcomputing, ICSOC 2010, held in San Francisco, CA, USA in December 2010.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011.
The increasing costs of creating and maintaining infrastructures for delivering services to consumers have led to the emergence of cloud based third party service providers renting networks, computation power, storage, and even entire software application suites.
This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010.
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007.
The 7 revised full papers, 11 revised medium-length papers, 6 revised short, and 7 demo papers presented together with 10 poster/abstract papers describing late-breaking work were carefully reviewed and selected from numerous submissions.
This book presents the thoroughly refereed post-conference proceedings of the International Conference on Formal Verification of Object-Oriented Software, FoVeOOS 2010, held in Paris, France, in June 2010 - organised by COST Action IC0701.
This book is based on a selection of thoroughly revised and extended best papers from the 8th Workshop on E-Business (WEB 2009) held in Phoenix, AZ, USA, on December 15th, 2009.
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age.
The International Conference on E-business Technology & Strategy (CETS) provides a peer-reviewed forum for researchers from across the globe to share contemporary research on developments in the fields of e-business, information technology and business strategy.
This volume constitutes the proceedings of the 5th International Workshop on Trends in Enterprise Architecture Research (TEAR), held in Delft, The Netherlands, on November 12, 2010.
This book constitutes the post-proceedings of the International Workshop on Ontology, Conceptualization and Epistemology for Information Systems, Software Engineering and Service Sciences (ONTOSE 2010) , held at the CAiSE 2010 conference in Hammamet, Tunisia, June, 2010.
The conference series BIR (Business Informatics Research) was established 10 years ago in Rostock as an initiative of researchers from Swedish and German universities.
This edited book is intended for use by students, academics and practitioners who take interest in outsourcing and offshoring of information technology and business pr- esses.
This book constitutes the post-proceedings of the 6th International Workshop on Enterprise and Organizational Modeling and Simulation (EOMAS 2010) , held at the CAiSE 2010 conference in Hammamet, Tunisia, June 7-8, 2010.
It is our great pleasure to present the proceedings of the Third International Workshop on Multiple Access Communications (MACOM) that was held in Barcelona during September 13-14, 2010.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010.