|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-44341-6 |
003 |
DE-He213 |
005 |
20220115075543.0 |
007 |
cr nn 008mamaa |
008 |
160805s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319443416
|9 978-3-319-44341-6
|
024 |
7 |
|
|a 10.1007/978-3-319-44341-6
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Trust, Privacy and Security in Digital Business
|h [electronic resource] :
|b 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings /
|c edited by Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a IX, 123 p. 30 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9830
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016. The 8 revised full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: security, privacy and trust in eServices; security and privacy in cloud computing; privacy requirements; and information audit and trust.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Computer networks .
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Katsikas, Sokratis.
|e editor.
|0 (orcid)0000-0003-2966-9683
|1 https://orcid.org/0000-0003-2966-9683
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Lambrinoudakis, Costas.
|e editor.
|0 (orcid)0000-0003-3101-5347
|1 https://orcid.org/0000-0003-3101-5347
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Furnell, Steven.
|e editor.
|0 (orcid)0000-0003-0984-7542
|1 https://orcid.org/0000-0003-0984-7542
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319443409
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319443423
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9830
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-44341-6
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|