E-Democracy, Security, Privacy and Trust in a Digital World: by Alexander B. Sideridis, Zoe Kardasiadou, Constantine P.

Posted by

By Alexander B. Sideridis, Zoe Kardasiadou, Constantine P. Yialouris, Vasilios Zorkadis (eds.)

This e-book constitutes the completely refereed post-conference lawsuits of the fifth overseas convention on safeguard, privateness and belief in a electronic global, e-Democracy 2013, held in Athens, Greece, December 2013. The 20 revised complete papers awarded have been rigorously chosen from a variety of submissions. The papers are equipped in topical sections on safeguard, privateness; e-governance; e-government functions, virtualizations; politics, laws: eu initiatives.

Show description

Read Online or Download E-Democracy, Security, Privacy and Trust in a Digital World: 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers PDF

Best international_1 books

Smart Graphics: 10th International Symposium, SG 2009, Salamanca, Spain, May 28-30, 2009. Proceedings

This e-book constitutes the refereed lawsuits of the tenth foreign Symposium on shrewdpermanent pix, SG 2009, held in Salamanca, Spain in could 2009. The 15 revised complete papers including eight brief papers and a pair of demonstrations offered have been conscientiously reviewed and chosen. The papers are prepared in topical sections on visible analytics, consumer reviews, human computing device interplay, special effects and synthetic intelligence, in addition to digital and combined truth.

Personal Wireless Communications: The 12th IFIP International Conference on Personal Wireless Communications (PWC 2007), Prague, Czech Republic, September 2007

Foreign Federation for info ProcessingThe IFIP sequence publishes cutting-edge ends up in the sciences and applied sciences of data and communique. The scope of the sequence contains: foundations of computing device technology; software program idea and perform; schooling; computing device purposes in expertise; verbal exchange platforms; structures modeling and optimization; info platforms; pcs and society; computers expertise; defense and security in details processing structures; man made intelligence; and human-computer interplay.

E-Business and Telecommunications: International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers

This booklet constitutes the refereed lawsuits of the ninth foreign Joint convention on E-Business and Telecommunications, ICETE 2012, held in Rome, Italy, in July 2012. ICETE is a joint overseas convention integrating 4 significant components of data which are divided into six corresponding meetings: foreign convention on information verbal exchange Networking, DCNET; foreign convention on E-Business, ICE-B; foreign convention on Optical conversation platforms, OPTICS; foreign convention on defense and Cryptography, SECRYPT; foreign convention on instant info platforms, WINSYS; and foreign convention on sign Processing and Multimedia, SIGMAP.

Additional info for E-Democracy, Security, Privacy and Trust in a Digital World: 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers

Sample text

Springer, Heidelberg (2012) 32. : Comparison of risk analysis methods: Mehari, Magerit, NIST800-30 and Microsoft’s Security Management Guide. org Abstract. With inception of Service-Orientation in research and industry, the need to select a Reference Architecture (RA) that supports Service Orientation in some specific domain has developed into a challenge. Institutionalizing a criterion that helps software designers and developers to properly extend or design an RA for a domain-specific, goal-aware and context-aware implementation of a Service-Oriented Architecture (SOA) system has evolved into a necessity.

These steps are the processes of identifying, quantifying and associating risk to assets. On the other hand, a risk assessment tool is oriented towards the measurement of the potential for losses that a threat could have on an organization. Tools are based on methodologies and most often a specific tool is developed for a specific methodology [1, 26]. These methodologies must be compliant to standards that deal with critical infrastructures’ safety and security. Table 1 provides a list of standards as well as of some best practices that address security and safety issues in ports.

Iliadis encoding based on Gaussian receptive fields. As a consequence of this transformation input neurons emit spikes at pre-defined firing times, invoking the one pass learning algorithm. The learning iteratively creates repositories of neurons, one repository for each class. Finally, the output of the second neural layer determines the class label of the presented input stimulus. The eSNN model was investigated in a number of scenarios and reported promising results. Moreover the MLFF ANN system is a pattern recognition system which detects the attacks and classifies them with high accuracy and adds a greater degree of integrity to the rest of security infrastructure of HESADM.

Download PDF sample

Rated 4.37 of 5 – based on 41 votes