|
|
|
|
LEADER |
03340nam a2200589 4500 |
001 |
978-3-319-98385-1 |
003 |
DE-He213 |
005 |
20191026042505.0 |
007 |
cr nn 008mamaa |
008 |
180726s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319983851
|9 978-3-319-98385-1
|
024 |
7 |
|
|a 10.1007/978-3-319-98385-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Trust, Privacy and Security in Digital Business
|h [electronic resource] :
|b 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings /
|c edited by Steven Furnell, Haralambos Mouratidis, Günther Pernul.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a X, 261 p. 60 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11033
|
505 |
0 |
|
|a Permission Models and Cloud -- Privacy -- Proactive Security Measures -- Cyber Physical Systems.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2018, held in Regensburg, Germany, in September 2018 in conjunction with DEXA 2018. The 15 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: Permission models and cloud, privacy, proactive security measures, and cyber physical systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Computers and Society.
|0 http://scigraph.springernature.com/things/product-market-codes/I24040
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|0 http://scigraph.springernature.com/things/product-market-codes/I18040
|
700 |
1 |
|
|a Furnell, Steven.
|e editor.
|0 (orcid)0000-0003-0984-7542
|1 https://orcid.org/0000-0003-0984-7542
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Mouratidis, Haralambos.
|e editor.
|0 (orcid)0000-0002-2599-0712
|1 https://orcid.org/0000-0002-2599-0712
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Pernul, Günther.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319983844
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319983868
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11033
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-98385-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|