|
|
|
|
LEADER |
02685nam a22005895i 4500 |
001 |
978-3-642-22444-7 |
003 |
DE-He213 |
005 |
20151204185620.0 |
007 |
cr nn 008mamaa |
008 |
111006s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642224447
|9 978-3-642-22444-7
|
024 |
7 |
|
|a 10.1007/978-3-642-22444-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.M3
|
072 |
|
7 |
|a UYZM
|2 bicssc
|
072 |
|
7 |
|a UKR
|2 bicssc
|
072 |
|
7 |
|a BUS083000
|2 bisacsh
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
245 |
1 |
0 |
|a Security and Trust Management
|h [electronic resource] :
|b 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers /
|c edited by Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2011.
|
300 |
|
|
|a X, 271 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 6710
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Operating Systems.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Cuellar, Jorge.
|e editor.
|
700 |
1 |
|
|a Lopez, Javier.
|e editor.
|
700 |
1 |
|
|a Barthe, Gilles.
|e editor.
|
700 |
1 |
|
|a Pretschner, Alexander.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642224430
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 6710
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-22444-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|