Information Technology Convergence, Secure and Trust Computing, and Data Management
Home > Technology & Engineering > Electronics & communications engineering > Communications engineering / telecommunications > Information Technology Convergence, Secure and Trust Computing, and Data Management
Information Technology Convergence, Secure and Trust Computing, and Data Management

Information Technology Convergence, Secure and Trust Computing, and Data Management


     0     
5
4
3
2
1



International Edition


About the Book

Information technology Convergence.- AdvancedC omputational Science and Applications.- Advanced Electrical and Electronics Engineering and Technology.- Intelligent Manufacturing Technology and Services.- Advanced Management Information Systems and Services.- Electronic Commerce, Business and Management.- Intelligent Vehicular Systems and Communications.- Bio-inspired Computing and Applications.- Advanced IT Medical Engineering.- Modeling and Services for Intelligent Building, Town, and City.-

Security and Trust computing.- Authentication and access control.- Anonymity, identity management.- Cryptographic protocols.- Data integrity, dependability.- Digital right management and intellectual property protection.- Accountability.- Applied cryptography.- Cybercrime and computer forensics.- Denial of service attacks.- Formal methods in security.- Information warfare.- Steganography and watermarking.- Intrusion tolerance.- System and network security.- Multimedia security.- Smartphone security issues.- Security for open convergence system.- Security for M2M platform.- Security and privacy issues for intelligent vehicular systems and communications.- Security issues for broadband convergence network.- IPTV security services.- Privacy-enhancing technology.- Security evaluation and management.- Security requirements engineering.- trust models and trust management policies.- Mobile trusted computing.- Trustworthy infrastructures and services for cloud computing.- Cryptographic aspects of trusted computing.- Establishing trust in embedded systems.- Virtualization for trusted platforms.- Verification of trusted computing architectures.-

Data management.- Data and information modelling.- Data and information networks.- Data structures and data management algorithms.- Data warehousing.- Distributed, parallel, P2P, and Grid-based databases.- Pervasive data and information.- Semantic web and ontologies.- Sensor data management.- WWW, XML, and databases.- Context-awareness and data mining.- Human-computer interface and interaction.- Smart homes / building and business model.- Intelligent multimedia services.- Smart sensor / RFID.- Intelligent pervasive computing.- Electronic / ubiquitous commerce and services.- Engineering information systems.- Enterprise data management / resource Planning.- Geographic information systems.- Mobile computing and data management.- System design and implementation using data management.- New novel mechanism and applications.- Cluster technologies.- Grid and cloud domputing.- Community and collaborative computing networks.- Support for autonomic grid infrastructure.- Resource management.- Grid-based problem solving environments.- System design and implementation using data management.- New novel mechanism and applications.


About the Author:

Jong Hyuk Park received his Ph.D. degree in Graduate School of Information Security from Korea University, Korea. From December, 2002 to July, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. From September, 2007 to August, 2009, He had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. He is now a professor at the Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Korea. Dr. Park has published about 100 research papers in international journals and conferences. He has been serving as chairs, program committee, or organizing committee chair for many international conferences and workshops. He is President of the Future Technology Research Association International (FTRA) and Korea Information Technology Convergence Society (KITCS). He is editor-in-chief of International Journal of Information Technology, Communications and Convergence (IJITCC), InderScience and Journal of Convergence (JoC), FTRA Publishing. He is Associate Editor / Editor of 14 international journals including 8 journals indexed by SCI(E). In addition, he has been serving as a Guest Editor for international journals by some publishers: Springer, Elsevier, John Wiley, Oxford Univ. press, Hindawi, Emerald, Inderscience. His research interests include security and digital forensics, ubiquitous and pervasive computing, context awareness, multimedia services, etc. He got the best paper award in ISA-08 conference and the outstanding leadership awards from IEEE HPCC-09 and ICA3PP-10. Dr. Park' s research interests include Digital Forensics, Security, Ubiquitous and Pervasive Computing, Context Awareness, Multimedia Service, etc. He is a member of the IEEE, IEEE Computer Society, KIPS, KICS, KIISC, KMMS, KDFS and KIIT.

Jongsung Kim received his Bachelor and Master degrees in Mathematics from Korea university, Korea in 2000 and 2002, respectively. He received double Doctoral degrees on "Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms", completed in November 2006 and February 2007 at the ESAT/COSIC group of Katholieke Universiteit Leuven and at Engineering in Information Security of Korea University, respectively. He had been a Research Professor of Center for Information Security Technologies (CIST) at Korea University, from March 2007 till August 2009. Dr. Kim has been an Assistant Professor of Division of e-Business, Kyungnam University, Korea, since September 2009. His research interests include symmetric cryptosystems, side-channel attacks, ubiquitous computing systems and digital forensics.

Deqing Zou is a professor Huazhong Universtiy of Science and Technology(HUST). He got his Ph.D in HUST in 2004. His research interests include system security, trusted computing, virtualization and cloud security, fault tolerance. He is the leader of system security group in Service Computing Technology and System Lab (SCTS) & Cluster and Grid Computing Lab (CGCL), HUST. Prof. Zou has published two books, more than 50 high-quality papers. He has served as PC Chairs/PC members in more than 30 International conferences.

Yang Sun Lee received the B.S. and M.S. degrees in Electrical & Electronic Engineering from Dongshin University and Ph.D. degrees in Dept. of IT Engineering from Mokwon University in 2001, 2003 and 2007, respectively. He was a Senior Engineer at R&D Center, Fumate Co., Ltd. from 2007 to 2009. Since 2009, he has worked as a Research Professor in Dept. of Information Communication Engineering at Chosun University. He is also serving as a guest editor, and editorial staff and review committee of INFORMATION Jorunal, Security and Communication Networks - Wiley InterScience, Wireless Personal Communications - Springer, International Journal of Communication Systems - Wiley InterScience, IET Signal Processing - IET Journal, IET Communications - IET Journal and other journals. His current research interests include UWB, multimedia communication, Network Transmission Scheme and Ubiquitous Sensor Networks.


Best Sellers



Product Details
  • ISBN-13: 9789401785037
  • Publisher: Springer
  • Publisher Imprint: Springer
  • Edition: 2012 ed.
  • Language: English
  • Returnable: N
  • Spine Width: 18 mm
  • Weight: 508 gr
  • ISBN-10: 9401785031
  • Publisher Date: 21 Sep 2014
  • Binding: Paperback
  • Height: 234 mm
  • No of Pages: 296
  • Series Title: Lecture Notes in Electrical Engineering
  • Sub Title: Itcs 2012 & Sta 2012
  • Width: 156 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Information Technology Convergence, Secure and Trust Computing, and Data Management
Springer -
Information Technology Convergence, Secure and Trust Computing, and Data Management
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Information Technology Convergence, Secure and Trust Computing, and Data Management

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!