Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such as ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks, mobility and personalization, put new requirements on privacy and security with respect to data management.
Program Chairs' Message th The 4 International Service Availability Symposium (ISAS 2007) continued with the tradition of its predecessors by bringing together researchers and practitioners from both academia and industry to address the problems of service availability.
SEAFOOD for Thought Headline-grabbing though it may be, the software industry's large-scale allo- tion of work to developing countries has not so far generated much technical analysis.
On behalf of the IEEE Communications Society, the Technical Committee on Network Operations and Management (CNOM), the Manweek 2007 Organizing Committee, and the members of the IPOM Technical Program Committee, it is our pleasure to present the proceedings of the Seventh IEEE Workshop on IP Operations and Management (IPOM2007), held as part of Manweek 2007 during October 31-November 2, 2007.
This book contains the best papers of the Third International Conference on E-business and Telecommunications (ICETE), which was held in 2006 in Portugal.
CHES2007,theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) and held in Vienna, Austria, September 10-13, 2007.
This book contains the best papers from the first two instances of the International Conference on Web Information Systems and Technologies (WEBIST 2005 and 2006), organized by the Institute for Systems and Technologies of Information, C- trol and Communication (INSTICC) in collaboration with the OMG (Object M- agement Group), held in Miami (USA) and Setubal (Portugal) respectively.
This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC 2008, held in Oslo, Norway, in June 2008, co-located with UIC 2008, the 5th International Conference on Ubiquitous Intelligence and Computing.
This book constitutes the thoroughly refereed proceedings of the 46th International Conference on Objects, Components, Models and Patterns, TOOLS EUROPE 2008, held in Zurich, Switzerland, in June/July 2008.
On behalf of the PROFES Organizing Committee, we are proud to present to you the proceedings of the 9th International Conference on Product-Focused Software Process Improvement (PROFES 2008) held in Frascati - Monteporzio Catone, Rome, Italy.
The Eight International Conference on Product-Focused Software Process Impro- ment (PROFES 2007) brought together researchers and industrial practitioners to report new research results and exchange experiences and findings in the area of process and product improvement.
Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), which was held in Hamburg, Germany, September 20-21, 2006, in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006).
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.
This book constitutes the refereed proceedings of the 14th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2008, held in Montpellier, France, in June 2008.
This book constitutes the thoroughly refereed post-workshop proceedings of 10 internationl workshops and 2 symposia held as satellite events of the 10th International Conference on Model Driven Engineering Languages and Systems, MoDELS 2007, in Nashville, TN, USA, in September/October 2007 (see LNCS 4735).
Researchneedsideas,discourseandexperimentationinordertothrive,butmore than ever we are expected to make researchimmediately 'relevant' and available to society and the world of commerce.
In June of 2002, over 500 professors, students and researchers met in Boston, Massachusetts for the Fourth International Conference on Complex Systems.
This book constitutes the thoroughly refereed post-proceedings of the Third International Service Availability Symposium, ISAS 2006, held in Helsinki, Finland, in May 2006.
This proceedings volume consists of selected papers presented at the Ninth Int- national Conference on Computer-Aided Scheduling of Public Transport (CASPT 2004), which was held at the Hilton San Diego Resort and Conference Center in San Diego, California, USA, from August 9-11, 2004.
This volume contains the proceedings of the 4th International Conference on Service- Oriented Computing (ICSOC 2006), which took place in Chicago, USA, December 4-7, 2006.
Model-driven architecture, and model-driven approaches in general, holds the promise of moving software development towards a higher level of abstraction.
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4-7, 2006.
RISE 2006 constituted an international forum for researchers and practitioners interestedintheadvancementandrapidapplicationofnovel,integrated,orpr- ticalsoftwareengineeringapproaches,beingpartofamethodologicalframework, that apply to the development of either new or evolving applications and s- tems.
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences.