|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-46598-2 |
003 |
DE-He213 |
005 |
20220115070853.0 |
007 |
cr nn 008mamaa |
008 |
160916s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319465982
|9 978-3-319-46598-2
|
024 |
7 |
|
|a 10.1007/978-3-319-46598-2
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security and Trust Management
|h [electronic resource] :
|b 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings /
|c edited by Gilles Barthe, Evangelos Markatos, Pierangela Samarati.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a X, 229 p. 59 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9871
|
505 |
0 |
|
|a Personal Security Device -- Privacy Analysis -- Linked Data -- Secure logs -- Information Security -- Security Policies.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016. The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models. .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Barthe, Gilles.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Markatos, Evangelos.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Samarati, Pierangela.
|e editor.
|0 (orcid)0000-0001-7395-4620
|1 https://orcid.org/0000-0001-7395-4620
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319465975
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319465999
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9871
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-46598-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|