IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its spe…
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; t…
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust an…
This book constitutes the refereed proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2015, held in Hamburg, Germany, in May 2015. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 28 submissions. In addition, the book contains one invited paper and 5 papers from a special session on trusted cloud ecosystems.…
Most computer users have an incorrect, but useful, cognitive metaphor for computers in which the user says (or types or clicks) something and a mystical, almost intelligent or magical, behavior happens. It is not a stretch to describe computer users as believing computers follow the laws of magic, where some magic incantation is entered, and the computer responds with an expected, but magical, …
The two volumes IFIP AICT 459 and 460 constitute the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2015, held in Tokyo, Japan, in September 2015. The 163 revised full papers were carefully reviewed and selected from 185 submissions. They are organized in the following topical sections: collaborative networks; globalization an…
This monograph presents a unified approach to model-based processing for underwater acoustic arrays. The use of physical models in passive array processing is not a new idea, but it has been used on a case-by-case basis, and as such, lacks any unifying structure. This work views all such processing methods as estimation procedures, which then can be unified by treating them all as a form of joi…