This book records one of the continuous attempts of the IFIP Working Group 8. 2, studying the interaction of information systems and the organization, to explore and understand the shifting boundaries and dependencies between organizational activities and their computer support. The book marks the result of the IFIP WG 8. 2 conference on "Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges. " Since its inception in the late 1970s, IFIP WG 8. 2 has sought to understand how computer-based information systems interact and must be designed as an integrated part of...
This book records one of the continuous attempts of the IFIP Working Group 8. 2, studying the interaction of information systems and the organization,...
Enterprise Architects, in their endeavor to achieve Enterprise Integration, have limited guidance on how best to use Enterprise Models and Modeling Tools to support their practice. It is widely recognized that the practice of engineering enterprises needs a number of models, but how to maintain the relation between these models with ease is still a problem. Model interoperability is an issue on multiople counts:
- How to interchange models between enterprise modeling tools?
- How to maintain the interdependencies between models - whether they describe the enterprise on the...
Enterprise Architects, in their endeavor to achieve Enterprise Integration, have limited guidance on how best to use Enterprise Models and Modeling...
Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1,...
Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In ad...
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of...
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information...
Governments, the media, the information technology industry and scientists publicly argue that information and communication technologies (ICT) will bring about an inevitable transition from "industrial" to "information" or "knowledge-based" economies and societies. It is assumed that all aspects of our economic and social lives, in both the public and private spheres, will be radically different from what they are today. The World Summit on the Information Society (Geneva 2003 - Tunis 2005) shows the importance of a worldwide reflection on those topics.
Perspectives and...
Governments, the media, the information technology industry and scientists publicly argue that information and communication technologies (ICT) wil...
The world of the twenty-?rst century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identi?cation is growing, not only in companies and organizations, but also in the world at large. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. Identity management challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the bene?ts of previous research...
The world of the twenty-?rst century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, inc...
Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.
This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical...
Critical Infrastructure Protection II describes original research results and innovative applications in the interdiscipl...
This book constitutes the refereed proceedings of the Second IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2011, held in Costa de Caparica, Portugal, in February 2011. The 67 revised full papers were carefully selected from numerous submissions. They cover a wide spectrum of topics ranging from collaborative enterprise networks to microelectronics. The papers are organized in topical sections on collaborative networks, service-oriented systems, computational intelligence, robotic systems, Petri nets, sensorial and perceptional systems,...
This book constitutes the refereed proceedings of the Second IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems,...
I want to express my sincere thanks to all authors who submitted research papers to support the Third IFIP International Conference on Computer and Computing Te- nologies in Agriculture and the Third Symposium on Development of Rural Infor- tion (CCTA 2009) held in China, during October 14-17, 2009. This conference was hosted by the CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University), China National En- neering Research Center for Information Technology in Agriculture, Asian Conf- ence on Precision Agriculture, International Federation for...
I want to express my sincere thanks to all authors who submitted research papers to support the Third IFIP International Conference on Computer and Co...
This book contains extended and revised versions of the best papers that were p- sented during the 16th edition of the IFIP/IEEE WG10.5 International Conference on Very Large Scale Integration, a global System-on-a-Chip Design & CAD conference. The 16th conference was held at the Grand Hotel of Rhodes Island, Greece (October 13-15, 2008). Previous conferences have taken place in Edinburgh, Trondheim, V- couver, Munich, Grenoble, Tokyo, Gramado, Lisbon, Montpellier, Darmstadt, Perth, Nice and Atlanta. VLSI-SoC 2008 was the 16th in a series of international conferences sponsored by IFIP TC 10...
This book contains extended and revised versions of the best papers that were p- sented during the 16th edition of the IFIP/IEEE WG10.5 International ...