Istituto di Scienza e Tecnologie dell'Informazione     
Ter Beek M. H., Gadducci F. Second international workshop on views on designing complex architectures. In: Electronic Notes in Theoretical Computer Science. Editorial, vol. 168 pp. 1 - 3. Second International Workshop on Views On Designing Complex Architectures. VODCA 2006 (Bertinoro, Italy, 16-17 September 2006). Proceedings. M.H. ter Beek, F. Gadducci (eds.). Elsevier, 2007.
The second international workshop on Views On Designing Complex Architectures (VODCA 2006) was held in Bertinoro, Italy, on the 16th and 17th of September 2006, as a satellite event to the sixth international school on Foundations of Security Analysis and Design (FOSAD 2006). Security and management of information are key issues in informatics, and they have been for several years now among its fastest developing fields. Such a synergetic combination calls for a continuous attention of computer science researchers to the most recent developments in the area, in order to bring forth novel ideas and insights and thus to contribute to the growth of those fields. The VODCA workshop series aims to provide a platform for young computer scientists to present their research views on all areas related to the design of complex architectures, with a special focus on the security and management of information. A total of 20 papers were submitted and after a regular refereeing process only 13 of them were selected for a presentation. In addition to the presentations of original research results, the programme included 2 invited lectures. We believe that the most important result of any workshop should be the fostering and establishing of collaborations, as well as the sharing of techniques and their cross-fertilisation. These words sound truer for a workshop like VODCA: We hope that the meeting has helped its participants to focus on original 'views on the design of complex architectures,' especially as far as the security and management of information issues are concerned.
URL: http://www.sciencedirect.com/science?_ob=PublicationURL&_tockey=%23TOC%2313109%232007%23998319999%23643534%23FLP%23&_cdi=13109&_pubType=J&_auth=y&_acct=C000061181&_version=1&_urlVersion=0&_userid=5511047&md5=1dc4620ce96c234eeb1999cfa7d4f514
Subject Security and Protection
Database Management
Software Management
D.4.6 Security and Protection
H.2 Database Management
K.6.3 Software Management

Icona documento 1) Download Document PDF

Icona documento Open access Icona documento Restricted Icona documento Private


Per ulteriori informazioni, contattare: Librarian http://puma.isti.cnr.it

Valid HTML 4.0 Transitional