Artificial Intelligence and Security in Computing Systems

9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings

  • Editors
  • Jerzy Sołdek
  • Leszek Drobiazgiewicz

Table of contents

  1. Front Matter
    Pages i-xi
  2. Artificial Intelligence Methods and Intelligent Agents

    1. Front Matter
      Pages 1-1
    2. Facchinetti Gisella, Franci Francesco, Mastroleo Giovanni, Pagliaro Vittorio, Ricci Gianni
      Pages 3-12
    3. Francesco Forte, Michela Mantovani, Gisella Facchinetti, Giovanni Mastroleo
      Pages 13-21
    4. Waldemar Uchacz, Zbigniew Pietrzykowski
      Pages 23-32
    5. Alicja Mieszkowicz-Rolka, Leszek Rolka
      Pages 33-40
    6. Yugo Ito, Shin-ichi Miyazaki, Yoshinobu Higami, Shin-Ya Kobayashi
      Pages 91-99
    7. Przemysław Różewski, Antoni Wiliński, Oleg Zaikine, Krzysztof Giżycki
      Pages 101-110
    8. Edward Nawarecki, Grzegorz Dobrowolski, Marek Kisiel-Dorohinicki
      Pages 111-118
    9. Pablo Gruer, Vincent Hilaire, Jaroslaw Kozlak, Abder Koukam
      Pages 119-126
    10. Orest Popov, Anna Barcz, Piotr Piela, Tomasz Sobczak
      Pages 127-135
    11. Bożena Śmiałkowska
      Pages 153-162
  3. Computer Security and Safety

    1. Front Matter
      Pages 173-173
    2. Mirosław Kurkowski, Jerzy Pejaś
      Pages 175-189
    3. Marcin Gogolewski, Mirosław Kutyłowski
      Pages 217-226
    4. Tadeusz Gajewski, Izabela Janicka-Lipska, Janusz Stokłosa
      Pages 239-248
    5. Krzysztof Chmiel
      Pages 293-302

About these proceedings


Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:

-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.
-Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems.
-Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).


Automat algorithms artificial intelligence autonom classification cognition decision support system evolution evolutionary algorithm expert system formal language modeling neural network optimization verification

Bibliographic information

  • DOI
  • Copyright Information Kluwer Academic Publishers 2003
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4613-4847-4
  • Online ISBN 978-1-4419-9226-0
  • Series Print ISSN 0893-3405
  • Buy this book on publisher's site