|
|
|
|
LEADER |
02757nam a22005655i 4500 |
001 |
978-3-319-46598-2 |
003 |
DE-He213 |
005 |
20160916010525.0 |
007 |
cr nn 008mamaa |
008 |
160916s2016 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319465982
|9 978-3-319-46598-2
|
024 |
7 |
|
|a 10.1007/978-3-319-46598-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security and Trust Management
|h [electronic resource] :
|b 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings /
|c edited by Gilles Barthe, Evangelos Markatos, Pierangela Samarati.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a X, 229 p. 59 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9871
|
505 |
0 |
|
|a Personal Security Device -- Privacy Analysis -- Linked Data -- Secure logs -- Information Security -- Security Policies.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016. The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models. .
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Barthe, Gilles.
|e editor.
|
700 |
1 |
|
|a Markatos, Evangelos.
|e editor.
|
700 |
1 |
|
|a Samarati, Pierangela.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319465975
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9871
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-46598-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|