A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…
A concise reference to the state of the art in systems interoperability, Enterprise Interoperability VII will be of great value to engineers and computer scientists working in manufacturing and other process industries and to software engineers and electronic and manufacturing engineers working in the academic environment. Furthermore, it shows how knowledge of the meaning within information an…
This book constitutes the proceedings of the 6th International IFIP Working Conference on Enterprise Interoperability, IWEI 2015, held in Nîmes, France, in May 2015. The event was organized by the IFIP Working Group 5.8 on Enterprise Interoperability in co-operation with INTEROP-VLab and PGSO (Pole Grand Sud Ouest) from INTEROP-Vlab. The theme for IWEI 2015 was “From Enterprise Interoperabil…
This book contains revised papers from the 17th International Conference on Enterprise Information Systems, ICEIS 2015, held in Barcelona, Spain, in April 2015. The 31 papers presented in this volume were carefully reviewed and selected from a total of 327 submissions. The book also contains one full-paper invited talk. The selected papers reflect state-of-the-art research that is oriented …
This book contains extended and revised papers from the 16th International Conference on Enterprise Information Systems, ICEIS 2014, held in Lisbon, Portugal, in April 2014. The 24 papers presented in this volume were carefully reviewed and selected from a total of 313 submissions. The book also contains two full-paper invited talks. The selected papers reflect state-of-the-art research that…
This book explains how to combine and exploit sensor networks and internet-of-things (IoT) technologies and Web-service design patterns to enrich and integrate Building Information Models (BIMs). It provides approaches and software architectures for facilitating the interaction with (and between) BIMs through Web services, and for enabling and facilitating the fusion of the information residing…
This book constitutes the refereed proceedings of the 15th International Conference on Web Engineering, ICWE 2015, held in Rotterdam, The Netherlands, in June 2015. The 26 full research papers, 11 short papers, 7 industry papers, 11 demonstrations, 6 posters and 4 contributions to the PhD symposium presented were carefully reviewed and selected from 100 submissions. Moreover 2 tutorials are …
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measuremen…
This book constitutes the refereed proceedings of the 5th International Symposium on End-User Development, IS-EUD 2015, held in Madrid, Spain, in May 2015. The 10 full papers and 13 short papers were presented at the event. Additionally, the volume contains 2 keynote speeches, 3 doctoral consortia papers, 1 workshop paper and 6 EUD-playground papers. The papers provide a broad overview of the c…
This book constitutes the revised selected papers of the Third International Conference on Networked Systems, NETYS 2015, held in Agadir, Morocco, in May 2015. The 29 full papers and 12 short papers presented together with 22 poster abstracts were carefully reviewed and selected from 133 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorith…