Book Volume 8127 2013

Availability, Reliability, and Security in Information Systems and HCI

IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings

ISBN: 978-3-642-40510-5 (Print) 978-3-642-40511-2 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013)

    1. Economic, Ethical, Legal, Multilingual, Organizational and Social Aspects

      1. No Access

        Chapter and Conference Paper

        Pages 1-15

        Sensor Data Meets Social Networks Reflecting on Benefits in the Case of a Patient Room

      2. No Access

        Chapter and Conference Paper

        Pages 16-27

        Older Users’ Wish List for Technology Attributes

      3. No Access

        Chapter and Conference Paper

        Pages 28-43

        Evaluating the Energy Efficiency of OLTP Operations

      Context-Oriented Information Integration

      1. No Access

        Chapter and Conference Paper

        Pages 44-53

        Chaining Data and Visualization Web Services for Decision Making in Information Systems

      2. No Access

        Chapter and Conference Paper

        Pages 54-68

        A Fully Reversible Data Transform Technique Enhancing Data Compression of SMILES Data

      3. No Access

        Chapter and Conference Paper

        Pages 69-83

        Personalized Web Search Using Emotional Features

      Data / Information Management as a Service

      1. No Access

        Chapter and Conference Paper

        Pages 84-99

        MetaExtractor: A System for Metadata Extraction from Structured Data Sources

      2. No Access

        Chapter and Conference Paper

        Pages 100-117

        Proxy Service for Multi-tenant Database Access

      3. No Access

        Chapter and Conference Paper

        Pages 118-133

        Extracting Correlated Patterns on Multicore Architectures

      Context-Oriented Information Integration and Location-Aware Computing

      1. No Access

        Chapter and Conference Paper

        Pages 134-148

        Index Data Structure for Fast Subset and Superset Queries

      2. No Access

        Chapter and Conference Paper

        Pages 149-161

        Opinion Mining in Conversational Content within Web Discussions and Commentaries

      3. No Access

        Chapter and Conference Paper

        Pages 162-177

        Diagnosis of Higher-Order Discrete-Event Systems

      Security and Privacy

      1. No Access

        Chapter and Conference Paper

        Pages 178-194

        Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods

      2. No Access

        Chapter and Conference Paper

        Pages 195-207

        GPRS Security for Smart Meters

      3. No Access

        Chapter and Conference Paper

        Pages 208-223

        Cloud-Based Privacy Aware Preference Aggregation Service

      Risk Management and Business Continuity

      1. No Access

        Chapter and Conference Paper

        Pages 224-239

        A Method for Re-using Existing ITIL Processes for Creating an ISO 27001 ISMS Process Applied to a High Availability Video Conferencing Cloud Scenario

      2. No Access

        Chapter and Conference Paper

        Pages 240-255

        Towards Improved Understanding and Holistic Management of the Cyber Security Challenges in Power Transmission Systems

      3. No Access

        Chapter and Conference Paper

        Pages 256-271

        Seeking Risks: Towards a Quantitative Risk Perception Measure

      Security and Privacy and Location Based Applications

      1. No Access

        Chapter and Conference Paper

        Pages 272-288

        A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements Engineering

      2. No Access

        Chapter and Conference Paper

        Pages 289-303

        Towards a Pervasive Access Control within Video Surveillance Systems

previous Page of 2