|
|
|
|
LEADER |
03457nam a22006495i 4500 |
001 |
978-3-319-48057-2 |
003 |
DE-He213 |
005 |
20161022063140.0 |
007 |
cr nn 008mamaa |
008 |
161022s2016 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319480572
|9 978-3-319-48057-2
|
024 |
7 |
|
|a 10.1007/978-3-319-48057-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.M3
|
072 |
|
7 |
|a UYZM
|2 bicssc
|
072 |
|
7 |
|a UKR
|2 bicssc
|
072 |
|
7 |
|a BUS083000
|2 bisacsh
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
245 |
1 |
0 |
|a Future Data and Security Engineering
|h [electronic resource] :
|b Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings /
|c edited by Tran Khanh Dang, Roland Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich Neuhold.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XIII, 430 p. 155 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10018
|
505 |
0 |
|
|a Big Data Analytics and Cloud Data Management -- Internet of Things and Applications -- Security and Privacy Engineering -- Data Protection and Data Hiding -- Advances in Authentication and Data Access Control -- Access Control in NoSQL and Big Data -- Context-based Data Analysis and Applications -- Emerging Data Management Systems and Applications.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016. The 27 revised full papers and 2 short papers presented were carefully reviewed and selected from 115 submissions. They have been organized in the following topical sections: Big Data Analytics and Cloud Data Management; Internet of Things and Applications; Security and Privacy Engineering; Data Protection and Data Hiding; Advances in Authentication and Data Access Control; Access Control in NoSQL and Big Data; Context-based Data Analysis and Applications; Emerging Data Management Systems and Applications.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Information storage and retrieval.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Information Storage and Retrieval.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Database Management.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
700 |
1 |
|
|a Dang, Tran Khanh.
|e editor.
|
700 |
1 |
|
|a Wagner, Roland.
|e editor.
|
700 |
1 |
|
|a Küng, Josef.
|e editor.
|
700 |
1 |
|
|a Thoai, Nam.
|e editor.
|
700 |
1 |
|
|a Takizawa, Makoto.
|e editor.
|
700 |
1 |
|
|a Neuhold, Erich.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319480565
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10018
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-48057-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|