|
|
|
|
LEADER |
02591nam a22005655i 4500 |
001 |
978-3-319-61176-1 |
003 |
DE-He213 |
005 |
20170621052837.0 |
007 |
cr nn 008mamaa |
008 |
170621s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319611761
|9 978-3-319-61176-1
|
024 |
7 |
|
|a 10.1007/978-3-319-61176-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Data and Applications Security and Privacy XXXI
|h [electronic resource] :
|b 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings /
|c edited by Giovanni Livraga, Sencun Zhu.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XIII, 556 p. 137 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10359
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 31st Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2017, held in Philadelphia, PA, USA, in July 2017. The 21 full papers and 9 short papers presented were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on access control, privacy, cloud security, secure storage in the cloud, secure systems, and security in networks and Web.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
700 |
1 |
|
|a Livraga, Giovanni.
|e editor.
|
700 |
1 |
|
|a Zhu, Sencun.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319611754
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10359
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-61176-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|