0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (27)
  • R2,500 - R5,000 (33)
  • -
Status
Brand

Showing 1 - 25 of 61 matches in All Departments

Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Hardcover, 2015 ed.): Elisa Bertino, Sorin... Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Hardcover, 2015 ed.)
Elisa Bertino, Sorin Adam Matei
R3,498 R1,875 Discovery Miles 18 750 Save R1,623 (46%) Ships in 12 - 17 working days

Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees awarded by higher learning institutions or occupying formal positions in notable organizations. Expertise is validated by reputations established in an institutionalized marketplace of ideas with a limited number of "available seats" and a stringent process of selection and retention of names, ideas, topics and facts of interest. However, the social media revolution, which has enabled over two billion Internet users not only to consume, but also to produce information and knowledge, has created a secondary and very active informal marketplace of ideas and knowledge. Anchored by platforms like Wikipedia, YouTube, Facebook and Twitter, this informal marketplace has low barriers to entry and has become a gigantic and potentially questionable, knowledge resource for the public at large. Roles, Trust and Reputation in Social Media Knowledge Markets will discuss some of the emerging trends in defining, measuring and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book will propose a future research agenda related to these issues. The ultimate goal of research agenda being to shape the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. The authors, including leading scholars and young innovators, will share with the readers some of the main lessons they have learned from their own work in these areas and will discuss the issues, topics and sub-areas that they find under-studied or that promise the greatest intellectual payoff in the future. The discussion will be placed in the context of social network analysis and "big data" research. Roles, Trust and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature, as the research agenda in reputation and authorship is still emerging. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories and methodologies proposed by the contributors offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow's information consumers make smarter choices, developers to create new tools and researchers to launch new research programs.

Trust Management III - Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009,... Trust Management III - Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009, Proceedings (Hardcover, 2009 ed.)
Elena Ferrari, Ninghui Li, Elisa Bertino, Yucel Karabulut
R2,831 Discovery Miles 28 310 Ships in 10 - 15 working days

ThisvolumecontainstheproceedingsofIFIPTM2009, theThirdIFIPWG11.11 International Conference on Trust Management, held at Purdue University in West Lafayette, Indiana, USA during June 15-19, 2009. IFIPTM 2009 provided a truly global platform for the reporting of research, development, policyandpracticeintheinterdependentareasofprivacy, security, and trust. Building on the traditions inherited from the highly successful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, and the IFIPTM 2008conferencein Trondheim, Norway, IFIPTM 2009 focusedontrust, privacyand security from multidisciplinary perspectives. The conferenceisanarenafor discussionaboutrelevantproblemsfromboth research and practice in the areas of academia, business, and government. IFIPTM 2009 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2009 received 44 submissions. The ProgramCommittee selected 17 - pers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include one invited paper and ?ve demo descriptions. The highlights of IFIPTM 2009 included invited talks and tutorials by academic and governmental experts in the ?elds of trust management, privacy and security, including Eugene Spa?ord, Marianne Winslett, and Michael Novak. Running an international conference requires an immense e?ort from all p- ties involved. We would like to thank the Program Committee members and external referees for having provided timely and in-depth reviews of the subm- ted papers.We wouldalsolike to thank the Workshop, Tutorial, Demonstration, Local Arrangements, and Website Chairs, for having provided great help or- nizing the con

Indexing Techniques for Advanced Database Systems (Hardcover, 1997 ed.): Elisa Bertino, Beng Chin Ooi, Ron Sacks-Davis,... Indexing Techniques for Advanced Database Systems (Hardcover, 1997 ed.)
Elisa Bertino, Beng Chin Ooi, Ron Sacks-Davis, Kian-Lee Tan, Justin Zobel, …
R4,379 Discovery Miles 43 790 Ships in 10 - 15 working days

Recent years have seen an explosive growth in the use of new database applications such as CAD/CAM systems, spatial information systems, and multimedia information systems. The needs of these applications are far more complex than traditional business applications. They call for support of objects with complex data types, such as images and spatial objects, and for support of objects with wildly varying numbers of index terms, such as documents. Traditional indexing techniques such as the B-tree and its variants do not efficiently support these applications, and so new indexing mechanisms have been developed. As a result of the demand for database support for new applications, there has been a proliferation of new indexing techniques. The need for a book addressing indexing problems in advanced applications is evident. For practitioners and database and application developers, this book explains best practice, guiding the selection of appropriate indexes for each application. For researchers, this book provides a foundation for the development of new and more robust indexes. For newcomers, this book is an overview of the wide range of advanced indexing techniques. Indexing Techniques for Advanced Database Systems is suitable as a secondary text for a graduate level course on indexing techniques, and as a reference for researchers and practitioners in industry.

Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.): Elisa Bertino, Lorenzo Martino, Federica... Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.)
Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini
R2,200 Discovery Miles 22 000 Ships in 10 - 15 working days

Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards, anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace all those new collaborative applications and to indicate a new, "social" approach to generating and distributing Web content, characterized by open communication, decentralization of authority, and freedom to share and reuse. For Web services technologies to hold their promise, it is crucial that - curity of services and their interactions with users be assured. Con?dentiality, integrity, availability, anddigitalidentitymanagementareallrequired.People need to be assured that their interactions with services over the Web are kept con?dential and the privacy of their personal information is preserved. People need to be sure that information they use for looking up and selecting s- vicesiscorrectanditsintegrityisassured.Peoplewantservicestobeavailable when needed. They also require interactions to be convenient and person- ized, in addition to being private. Addressing these requirements, especially when dealing with open distributed applications, is a formidable challenge.

Distributed and Parallel Database Object Management (Hardcover, Reprinted edition): Elisa Bertino, Tamer OEzsu Distributed and Parallel Database Object Management (Hardcover, Reprinted edition)
Elisa Bertino, Tamer OEzsu
R4,298 Discovery Miles 42 980 Ships in 10 - 15 working days

Distributed and Parallel Database Object Management brings together in one place important contributions and state-of-the-art research results in this rapidly advancing area of computer science. Distributed and Parallel Database Object Management serves as an excellent reference, providing insights into some of the most important issues in the field.

Essentials of Blockchain Technology (Paperback): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Paperback)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R1,411 Discovery Miles 14 110 Ships in 12 - 17 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021,... Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Xingming Sun, Xiao Rui Zhang, Zhihua Xia, Elisa Bertino
R2,924 Discovery Miles 29 240 Ships in 10 - 15 working days

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021,... Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III (Paperback, 1st ed. 2021)
Xingming Sun, Xiao Rui Zhang, Zhihua Xia, Elisa Bertino
R2,929 Discovery Miles 29 290 Ships in 10 - 15 working days

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021): Xiaofeng Chen, Willy Susilo, Elisa Bertino Cyber Security Meets Machine Learning (Hardcover, 1st ed. 2021)
Xiaofeng Chen, Willy Susilo, Elisa Bertino
R3,706 Discovery Miles 37 060 Ships in 12 - 17 working days

Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.

Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings,... Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Xingming Sun, Jinwei Wang, Elisa Bertino
R2,922 Discovery Miles 29 220 Ships in 10 - 15 working days

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.

Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings,... Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Xingming Sun, Jinwei Wang, Elisa Bertino
R2,918 Discovery Miles 29 180 Ships in 10 - 15 working days

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,582 Discovery Miles 15 820 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IV (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,579 Discovery Miles 15 790 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,606 Discovery Miles 16 060 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,607 Discovery Miles 16 070 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part VI (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,607 Discovery Miles 16 070 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,606 Discovery Miles 16 060 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected... Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III (Paperback, 1st ed. 2018)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,600 Discovery Miles 16 000 Ships in 10 - 15 working days

This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Paperback, Softcover reprint of the... Roles, Trust, and Reputation in Social Media Knowledge Markets - Theory and Methods (Paperback, Softcover reprint of the original 1st ed. 2015)
Elisa Bertino, Sorin Adam Matei
R2,026 Discovery Miles 20 260 Ships in 10 - 15 working days

Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees awarded by higher learning institutions or occupying formal positions in notable organizations. Expertise is validated by reputations established in an institutionalized marketplace of ideas with a limited number of "available seats" and a stringent process of selection and retention of names, ideas, topics and facts of interest. However, the social media revolution, which has enabled over two billion Internet users not only to consume, but also to produce information and knowledge, has created a secondary and very active informal marketplace of ideas and knowledge. Anchored by platforms like Wikipedia, YouTube, Facebook and Twitter, this informal marketplace has low barriers to entry and has become a gigantic and potentially questionable, knowledge resource for the public at large. Roles, Trust and Reputation in Social Media Knowledge Markets will discuss some of the emerging trends in defining, measuring and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book will propose a future research agenda related to these issues. The ultimate goal of research agenda being to shape the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. The authors, including leading scholars and young innovators, will share with the readers some of the main lessons they have learned from their own work in these areas and will discuss the issues, topics and sub-areas that they find under-studied or that promise the greatest intellectual payoff in the future. The discussion will be placed in the context of social network analysis and "big data" research. Roles, Trust and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature, as the research agenda in reputation and authorship is still emerging. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories and methodologies proposed by the contributors offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow's information consumers make smarter choices, developers to create new tools and researchers to launch new research programs.

Security for Web Services and Service-Oriented Architectures (Paperback, 2010 ed.): Elisa Bertino, Lorenzo Martino, Federica... Security for Web Services and Service-Oriented Architectures (Paperback, 2010 ed.)
Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards,anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace all those new collaborative applications and to indicate a new, "social" approach to generating and distributing Web content, characterized by open communication, decentralization of authority, and freedom to share and reuse. For Web services technologies to hold their promise, it is crucial that - curity of services and their interactions with users be assured. Con?dentiality, integrity,availability,anddigitalidentitymanagementareallrequired.People need to be assured that their interactions with services over the Web are kept con?dential and the privacy of their personal information is preserved. People need to be sure that information they use for looking up and selecting s- vicesiscorrectanditsintegrityisassured.Peoplewantservicestobeavailable when needed. They also require interactions to be convenient and person- ized, in addition to being private. Addressing these requirements, especially when dealing with open distributed applications, is a formidable challenge.

Homomorphic Encryption and Applications (Paperback, 2014 ed.): Xun Yi, Russell Paulet, Elisa Bertino Homomorphic Encryption and Applications (Paperback, 2014 ed.)
Xun Yi, Russell Paulet, Elisa Bertino
R2,469 Discovery Miles 24 690 Ships in 10 - 15 working days

This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.

RFID Security and Privacy (Paperback): Yingjiu Li, Robert Deng, Elisa Bertino RFID Security and Privacy (Paperback)
Yingjiu Li, Robert Deng, Elisa Bertino
R1,034 Discovery Miles 10 340 Ships in 10 - 15 working days

As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Boucheron Boucheron Eau De Parfum Spray…
R3,444 R1,046 Discovery Miles 10 460
Bostik Glu Tape
R38 Discovery Miles 380
Maped Black and Whiteboard Magnetic…
R36 R31 Discovery Miles 310
Adidas Combat Sport Backpack (Navy Blue)
R686 R572 Discovery Miles 5 720
1.5V Alkaline Button Battery Assortment…
R151 Discovery Miles 1 510
Atmosfire
Jan Braai Hardcover R590 R425 Discovery Miles 4 250
Ab Wheel
R209 R149 Discovery Miles 1 490
Mellerware Aquillo Desktop Fan (White…
R579 Discovery Miles 5 790
XXdreamSToys Bondage Tape (20m)(Black)
R199 R69 Discovery Miles 690
Vital BabyŽ NOURISH™ Power™ Suction Bowl…
R159 Discovery Miles 1 590

 

Partners