Ensuring the Integrity, Accessibility, and Stewardship of Research Data in the Digital Age

Ensuring the Integrity, Accessibility, and Stewardship of Research Data in the Digital Age
Author: Institute of Medicine
Publisher: National Academies Press
Total Pages: 179
Release: 2009-11-17
Genre: Computers
ISBN: 0309147824

As digital technologies are expanding the power and reach of research, they are also raising complex issues. These include complications in ensuring the validity of research data; standards that do not keep pace with the high rate of innovation; restrictions on data sharing that reduce the ability of researchers to verify results and build on previous research; and huge increases in the amount of data being generated, creating severe challenges in preserving that data for long-term use. Ensuring the Integrity, Accessibility, and Stewardship of Research Data in the Digital Age examines the consequences of the changes affecting research data with respect to three issues - integrity, accessibility, and stewardship-and finds a need for a new approach to the design and the management of research projects. The report recommends that all researchers receive appropriate training in the management of research data, and calls on researchers to make all research data, methods, and other information underlying results publicly accessible in a timely manner. The book also sees the stewardship of research data as a critical long-term task for the research enterprise and its stakeholders. Individual researchers, research institutions, research sponsors, professional societies, and journals involved in scientific, engineering, and medical research will find this book an essential guide to the principles affecting research data in the digital age.

Theory and Practice of Cryptography Solutions for Secure Information Systems

Theory and Practice of Cryptography Solutions for Secure Information Systems
Author: Elçi, Atilla
Publisher: IGI Global
Total Pages: 611
Release: 2013-05-31
Genre: Computers
ISBN: 1466640316

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

Information Security and Privacy

Information Security and Privacy
Author: Vijav Varadharajan
Publisher: Springer Science & Business Media
Total Pages: 354
Release: 1997-06-25
Genre: Business & Economics
ISBN: 9783540632320

This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997. The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.

Computers at Risk

Computers at Risk
Author: National Research Council
Publisher: National Academies Press
Total Pages: 320
Release: 1990-02-01
Genre: Computers
ISBN: 0309043883

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.

Rough Sets and Knowledge Technology

Rough Sets and Knowledge Technology
Author: Peng Wen
Publisher: Springer Science & Business Media
Total Pages: 725
Release: 2009-06-24
Genre: Computers
ISBN: 3642029612

This book constitutes the refereed proceedings of the Fourth International Conference on Rough Sets and Knowledge Technology, RSKT 2009, held in Gold Coast, Australia, in July 2009. The 85 revised full papers papers presented together with 3 keynote papers and 2 special sessions were carefully reviewed and selected from 229 submissions. The papers are organized in topical sections on rough sets and computing, rough sets and data reduction, data mining and knowledge discovery, granular computing and cognitive computing, fuzzy sets and computing, knowledge technology and intelligent systems, computational intelligence and applications, image processing and understanding, and formal concept analysis.

Computer Security

Computer Security
Author: Matt Bishop
Publisher: Addison-Wesley Professional
Total Pages: 2108
Release: 2018-11-27
Genre: Computers
ISBN: 0134097173

The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition’s publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis. Understand computer security goals, problems, and challenges, and the deep links between theory and practice Learn how computer scientists seek to prove whether systems are secure Define security policies for confidentiality, integrity, availability, and more Analyze policies to reflect core questions of trust, and use them to constrain operations and change Implement cryptography as one component of a wider computer and network security strategy Use system-oriented techniques to establish effective security mechanisms, defining who can act and what they can do Set appropriate security goals for a system or product, and ascertain how well it meets them Recognize program flaws and malicious logic, and detect attackers seeking to exploit them This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Graph Transformations

Graph Transformations
Author: Hartmut Ehrig
Publisher: Springer
Total Pages: 431
Release: 2010-09-21
Genre: Computers
ISBN: 3642159281

Graphs are among the simplest and most universal models for a variety of s- tems, not just in computer science, but throughout engineering and the life sciences. When systems evolve we are interested in the way they change, to p- dict, support, or react to their evolution. Graph transformation combines the idea of graphs as a universal modelling paradigm with a rule-based approach to specify their evolution. The area is concerned with both the theory of graph transformation and their application to a variety of domains. The biannual International Conferences on Graph Transformation aim at bringingtogetherresearchersandpractitionersinterestedin the foundations and applicationsof graphtransformation.The ?fth conference,ICGT 2010,was held at the University of Twente (The Netherlands) in September/October 2010, alongwith severalsatellite events.It continuedthe line ofconferences previously held in Barcelona (Spain) in 2002, Rome (Italy) 2004, Natal (Brazil) in 2006 and Leicester (UK) in 2008, as well as a series of six International Workshops on Graph Transformation with Applications in Computer Science from 1978 to 1998. Also, ICGT alternates with the workshop series on Application of Graph Transformation with Industrial Relevance (AGTIVE). The conference was held under the auspices of EATCS and EASST.

The Measurement of Information Integrity

The Measurement of Information Integrity
Author: Michael Seadle
Publisher: Routledge
Total Pages: 151
Release: 2021-09-01
Genre: Social Science
ISBN: 1000436942

Arguing that there never was a time when politicians did not prevaricate and when some communities did not doubt conclusions that others considered to be facts, The Measurement of Information Integrity puts the post-truth era in context and offers measures for integrity in the modern world. Incorporating international examples from a range of disciplines, this book provides the reader with tools that will help them to evaluate public statements - especially ones involving the sciences and scholarship. It also provides intellectual tools to those who must assess potential violations of public or academic integrity. Many of these tools involve measurement mechanisms, ways of putting cases into context, and a recognition that few cases are simple black-and-white violations. Demonstrating that a binary approach to judging research integrity fails to recognize the complexity of the environment, Seadle highlights that even flawed discoveries may still contain value. Finally, the book reminds its reader that research integrity takes different forms in different disciplines and that each one needs separate consideration, even if the general principles remain the same for all. The Measurement of Information Integrity will help those who want to do research well, as well as those who must ascertain whether results have failed to meet the standards of the community. It will be of particular interest to researchers and students engaged in the study of library and information science.

Trust Management VI

Trust Management VI
Author: Theo Dimitrakos
Publisher: Springer
Total Pages: 294
Release: 2012-05-17
Genre: Computers
ISBN: 3642298524

This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The 12 revised full papers presented together with 8 short papers and the abstracts of 4 keynote talks were carefully reviewed and selected from 51 submissions. Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary conference focusing on areas such as: trust models, social, economic and behavioural aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.