Focusing on the critical issue of insider threats, this book explores various techniques to safeguard organizational data from internal misuse. It begins with an overview of insider threats and their impact on data breaches, followed by discussions on authentication, access control, and anomaly detection methods. The text emphasizes the importance of Security Information and Event Management (SIEM) tools and separation-of-duty principles in enhancing data protection. A case study on Oracle Database Vault illustrates practical applications, concluding with insights into future research directions.
This title discusses the emerging trends in defining, measuring, and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book also proposes a future research agenda related to these issues—with the ultimate goal of shaping the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. Roles, Trust, and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories, and methodologies proposed here offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow’s information consumers make smarter choices, developers to create new tools, and researchers to launch new research programs.
Web services technologies are rapidly evolving and widely implemented across various application environments. Utilizing XML, SOAP, and related standards within Service-Oriented Architectures (SOAs), these services enable Web-based interoperability for applications both within and between organizations. They facilitate the deployment of applications that users can directly engage with, transforming the Web into a dynamic medium for social interaction. The concept of Web 2.0 encompasses these collaborative applications, highlighting a new, social approach to creating and sharing Web content, marked by open communication, decentralized authority, and the freedom to share and reuse. For these technologies to fulfill their potential, it is essential to ensure the security of services and their interactions with users. This includes maintaining confidentiality, integrity, availability, and effective digital identity management. Users must trust that their interactions are private and that their personal information is safeguarded. They also need assurance regarding the accuracy and integrity of the information used to select services, as well as the availability of these services when required. Furthermore, interactions should be convenient and personalized, presenting significant challenges, particularly in the context of open distributed applications.
This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96. The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.
CollaborateCom is an annual international forum focused on sharing original ideas and research in collaborative computing networks, systems, and applications. A key objective is to unite researchers from diverse fields such as networking, systems, CSCW, collaborative learning, and education. The 2008 conference in Orlando, Florida, marked the fourth in the series, highlighting the rapid growth of collaborative computing as both a research and application domain. Recent advancements in various computing sectors, including multi-core architectures, 3G/4G wireless networks, Web 2.0 technologies, cloud computing, and software as a service, have significantly enhanced global interconnectivity. The potential for collaboration among different components now surpasses the capabilities of traditional system integration and interoperability methods. As we move towards a future of limitless connectivity and global computing, collaboration emerges as a critical challenge across diverse areas such as eCommerce, eGovernment, eScience, and information management. Collaborative computing acts as the essential link that integrates components and facilitates their interaction. The conference and its community of researchers showcase the tangible progress being made towards this vision, with gratitude extended to all who contributed to its success.
Following a 13-year tradition of excellence, the 14th ECOOP conference repeated the success of its predecessors. This excellence is certainly due to the level of maturity that object-oriented technology has reached, which warrants its use as a key paradigm in any computerized system. The principles of the object-oriented paradigm and the features of systems, languages, tools, and methodologies based on it are a source of research ideas and solutions to many in all areas of computer science. ECOOP 2000 showed a thriving eld characterized by success on the practical side and at the same time by continuous scienti c growth. Firmly established as a leading forum in the object-oriented arena, ECOOP 2000 received 109 high quality submissions. After a thorough review process, the program committee selected 20 papers, which well re? ect relevant trends in object-oriented research: object modeling, type theory, distribution and coo- ration, advanced tools, programming languages. The program committee, c- sisting of 31 distinguished researchers in object-orientation, met in Milan, Italy, to select the papers for inclusion in the technical program of the conference.
The 9th International Conference on Extending Database Technology took place in Heraklion, Crete, Greece, from March 14–18, 2004. This established conference serves as a prestigious forum for sharing the latest research in data management, occurring biennially in appealing European locations. It offers unique opportunities for researchers, practitioners, developers, and users to explore innovative ideas, techniques, and tools while exchanging experiences. Previous conferences were hosted in cities such as Venice, Vienna, and Prague. The 2004 conference focused on the theme “new challenges for database technology,” aiming to inspire researchers to engage with current technological advancements and to address emerging research directions. Database technology has historically evolved in response to new applications and continues to do so alongside advancements in hardware and application requirements. Today’s database management systems confront several new challenges, driven by trends like pervasive computing, grid computing, bioinformatics, and digital asset management. These developments necessitate the deployment of database technology across diverse environments and for various purposes, emphasizing the need for trustworthy, resilient, and flexible systems capable of securely managing data in all its forms.