000 | 03604nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-319-46598-2 | ||
003 | DE-He213 | ||
005 | 20210120143356.0 | ||
007 | cr nn 008mamaa | ||
008 | 160916s2016 gw | s |||| 0|eng d | ||
020 |
_a9783319465982 _9978-3-319-46598-2 |
||
024 | 7 |
_a10.1007/978-3-319-46598-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity and Trust Management _h[electronic resource] : _b12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings / _cedited by Gilles Barthe, Evangelos Markatos, Pierangela Samarati. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aX, 229 p. 59 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology ; _v9871 _aLecture Notes in Computer Science _v9871 |
|
505 | 0 | _aPersonal Security Device -- Privacy Analysis -- Linked Data -- Secure logs -- Information Security -- Security Policies. | |
520 | _aThis book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016. The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models. . | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aManagement information systems. | |
650 | 0 | _aComputer science. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aApplication software. | |
650 | 0 | _aComputers and civilization. | |
650 | 1 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 |
_aManagement of Computing and Information Systems. _0https://scigraph.springernature.com/ontologies/product-market-codes/I24067 |
650 | 2 | 4 |
_aCryptology. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28020 |
650 | 2 | 4 |
_aInformation Systems Applications (incl. Internet). _0https://scigraph.springernature.com/ontologies/product-market-codes/I18040 |
650 | 2 | 4 |
_aComputers and Society. _0https://scigraph.springernature.com/ontologies/product-market-codes/I24040 |
700 | 1 |
_aBarthe, Gilles. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMarkatos, Evangelos. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSamarati, Pierangela. _eeditor. _0(orcid)0000-0001-7395-4620 _1https://orcid.org/0000-0001-7395-4620 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319465975 |
776 | 0 | 8 |
_iPrinted edition: _z9783319465999 |
830 | 0 |
_aSecurity and Cryptology ; _v9871 |
|
830 | 0 |
_aLecture Notes in Computer Science ; _v9871 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-46598-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c57945 _d57945 |