Overview
- State-of-the-art research
- Fast-track conference proceedings
- Unique visibility
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8127)
Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)
Included in the following conference series:
Conference proceedings info: CD-ARES 2013.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
Table of contents (36 papers)
-
Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013)
-
Economic, Ethical, Legal, Multilingual, Organizational and Social Aspects
-
Data / Information Management as a Service
-
Context-Oriented Information Integration and Location-Aware Computing
-
Risk Management and Business Continuity
-
Security and Privacy and Location Based Applications
-
Other volumes
-
Availability, Reliability, and Security in Information Systems and HCI
-
Security Engineering and Intelligence Informatics
Editors and Affiliations
Bibliographic Information
Book Title: Availability, Reliability, and Security in Information Systems and HCI
Book Subtitle: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings
Editors: Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-40511-2
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: IFIP International Federation for Information Processing 2013
Softcover ISBN: 978-3-642-40510-5Published: 21 August 2013
eBook ISBN: 978-3-642-40511-2Published: 19 August 2013
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVI, 504
Number of Illustrations: 156 b/w illustrations
Topics: Information Systems Applications (incl. Internet), Systems and Data Security, Information Storage and Retrieval, Cryptology, e-Commerce/e-business, IT in Business