Eintrag weiter verarbeiten

Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers

Gespeichert in:

Personen und Körperschaften: Meadows, Catherine (VerfasserIn), Fernández-Gago, Carmen (Sonstige)
Titel: Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers/ edited by Catherine Meadows, Carmen Fernandez-Gago
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2012
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 7170
Schlagwörter:
Buchausg. u.d.T.: Security and trust management, Berlin : Springer, 2012, X, 238 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 06397cam a22013332 4500
001 0-165147690X
003 DE-627
005 20240122105109.0
007 cr uuu---uuuuu
008 120515s2012 gw |||||o 00| ||eng c
020 |a 9783642299636  |9 978-3-642-29963-6 
024 7 |a 10.1007/978-3-642-29963-6  |2 doi 
035 |a (DE-627)165147690X 
035 |a (DE-576)365272906 
035 |a (DE-599)BSZ365272906 
035 |a (OCoLC)799086386 
035 |a (ZBM)1238.68017 
035 |a (ZBM)1238.68017 
035 |a (DE-He213)978-3-642-29963-6 
035 |a (EBP)040542130 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE  |c XA-DE-BE 
050 0 |a QA76.9.M3 
072 7 |a UYZM  |2 bicssc 
072 7 |a UKR  |2 bicssc 
072 7 |a COM032000  |2 bisacsh 
072 7 |a BUS083000  |2 bisacsh 
072 7 |a KJQ  |2 bicssc 
084 |a SS 4800  |q SEPA  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *68-06  |2 msc 
084 |a 68P25  |2 msc 
084 |a 00B25  |2 msc 
084 |a 54.38  |2 bkl 
100 1 |a Meadows, Catherine  |4 aut 
245 1 0 |a Security and Trust Management  |b 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers  |c edited by Catherine Meadows, Carmen Fernandez-Gago 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2012 
300 |a Online-Ressource (X, 239p, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7170 
490 0 |a SpringerLink  |a Bücher 
500 |a Literaturangaben 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies. 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Information Systems 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
650 0 |a Electronic data processing 
650 0 |a Computer networks . 
650 0 |a Computers and civilization. 
650 0 |a Application software. 
655 7 |a Konferenzschrift  |y 2011  |z Kopenhagen  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)7562931-8  |0 (DE-627)526751819  |0 (DE-576)263014703  |a Trusted Computing  |2 gnd 
689 0 1 |D s  |0 (DE-588)4293034-0  |0 (DE-627)104199954  |0 (DE-576)210933003  |a Zugriffskontrolle  |2 gnd 
689 0 2 |D s  |0 (DE-588)4123980-5  |0 (DE-627)105751111  |0 (DE-576)209564288  |a Privatsphäre  |2 gnd 
689 0 |5 DE-101 
700 1 |a Fernández-Gago, Carmen  |0 (DE-627)1435288254  |0 (DE-576)36528825X  |4 oth 
776 1 |z 9783642299629 
776 0 8 |i Buchausg. u.d.T.  |t Security and trust management  |d Berlin : Springer, 2012  |h X, 238 S.  |w (DE-627)716645432  |w (DE-576)368549895  |z 3642299628  |z 9783642299629 
830 0 |a Lecture notes in computer science  |v 7170  |9 7170  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-29963-6  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-29963-6  |x Verlag  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz365272906cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20150929173751  |3 Cover 
856 4 2 |u https://zbmath.org/?q=an:1238.68017  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
856 4 2 |u http://deposit.d-nb.de/cgi-bin/dokserv?id=4004435&prov=M&dok_var=1&dok_ext=htm  |m X: MVB  |q text/html  |v 2013-05-01  |x Verlag  |3 Inhaltstext 
856 4 2 |u http://d-nb.info/1021362603/04  |m B:DE-101  |q application/pdf  |v 2013-05-01  |x Verlag  |3 Inhaltsverzeichnis 
889 |w (DE-627)715949705 
912 |a ZDB-2-LNC  |b 2012 
912 |a ZDB-2-SCS  |b 2012 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SXCS  |b 2012 
912 |a ZDB-2-SEB  |b 2012 
935 |h GBV  |i ExPruef 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
951 |a BO 
900 |a Gago, Carmen Fernández- 
950 |a Access control 
950 |a Zugangskontrolle 
950 |a Computersicherheit 
950 |a Schutz der Privatsphäre 
950 |a Persönlichkeitsrecht 
950 |a 私人领域 
950 |a 私隐 
950 |a 私人領域 
950 |a 私隱 
950 |a Сфера личной жизни 
950 |a Informationstechnik 
950 |a Sicherheit 
950 |a Vertrauenswürdigkeit 
950 |a Datensicherung 
950 |a Sealed Cloud 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-29963-6  |9 DE-14 
852 |a DE-14  |x epn:334942161X  |z 2012-05-15T10:50:50Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-29963-6  |9 DE-15 
852 |a DE-15  |x epn:3349421687  |z 2012-05-15T10:50:50Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-29963-6  |9 DE-Ch1 
852 |a DE-Ch1  |x epn:3349421741  |z 2012-05-15T10:50:50Z 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-29963-6  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |x epn:3349421806  |z 2012-11-10T04:25:31Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-29963-6  |9 DE-520 
852 |a DE-520  |x epn:3349421865  |z 2012-05-15T10:50:50Z 
980 |a 165147690X  |b 0  |k 165147690X  |o 365272906 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Security+and+Trust+Management%3A+7th+International+Workshop%2C+STM+2011%2C+Copenhagen%2C+Denmark%2C+June+27-28%2C+2011%2C+Revised+Selected+Papers&rft.date=2012&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Security+and+Trust+Management%3A+7th+International+Workshop%2C+STM+2011%2C+Copenhagen%2C+Denmark%2C+June+27-28%2C+2011%2C+Revised+Selected+Papers&rft.series=Lecture+notes+in+computer+science%2C+7170&rft.au=Meadows%2C+Catherine&rft.pub=Springer+Berlin+Heidelberg&rft.edition=&rft.isbn=3642299636
SOLR
_version_ 1792253784256151552
access_facet Electronic Resources
author Meadows, Catherine
author2 Fernández-Gago, Carmen
author2_role oth
author2_variant c f g cfg
author_facet Meadows, Catherine, Fernández-Gago, Carmen
author_role aut
author_sort Meadows, Catherine
author_variant c m cm
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.M3
callnumber-search QA76.9.M3
callnumber-sort QA 276.9 M3
callnumber-subject QA - Mathematics
collection ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
contents This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies.
ctrlnum (DE-627)165147690X, (DE-576)365272906, (DE-599)BSZ365272906, (OCoLC)799086386, (ZBM)1238.68017, (DE-He213)978-3-642-29963-6, (EBP)040542130
de15_date 2012-05-15T10:50:50Z
dech1_date 2012-05-15T10:50:50Z
doi_str_mv 10.1007/978-3-642-29963-6
era_facet 2011
facet_912a ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Trusted Computing, Zugriffskontrolle, Privatsphäre
finc_class_facet Informatik, Wirtschaftswissenschaften, Mathematik
fincclass_txtF_mv science-computerscience
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2011 Kopenhagen (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Kopenhagen
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7170
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-165147690X
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer Berlin Heidelberg, 2012
imprint_str_mv Berlin, Heidelberg: Springer Berlin Heidelberg, 2012
institution DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15
is_hierarchy_id 0-165147690X
is_hierarchy_title Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers
isbn 9783642299636
isbn_isn_mv 9783642299629, 3642299628
issn_isn_mv 1611-3349
kxp_id_str 165147690X
language English
last_indexed 2024-02-29T17:06:40.975Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic data processing, Computer networks ., Computers and civilization., Application software., Trusted Computing, Zugriffskontrolle, Privatsphäre
marc024a_ct_mv 10.1007/978-3-642-29963-6
match_str meadows2012securityandtrustmanagement7thinternationalworkshopstm2011copenhagendenmarkjune27282011revisedselectedpapers
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)7170
names_id_str_mv (DE-627)1435288254, (DE-576)36528825X
oclc_num 799086386
physical Online-Ressource (X, 239p, digital)
publishDate 2012
publishDateSort 2012
publishPlace Berlin, Heidelberg
publisher Springer Berlin Heidelberg
record_format marcfinc
record_id 365272906
recordtype marcfinc
rsn_id_str_mv (DE-15)3088249
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 7170
series2 Lecture Notes in Computer Science ; 7170, SpringerLink ; Bücher
source_id 0
spelling Meadows, Catherine aut, Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers edited by Catherine Meadows, Carmen Fernandez-Gago, Berlin, Heidelberg Springer Berlin Heidelberg 2012, Online-Ressource (X, 239p, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7170, SpringerLink Bücher, Literaturangaben, This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies., Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic data processing, Computer networks ., Computers and civilization., Application software., Konferenzschrift 2011 Kopenhagen (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)7562931-8 (DE-627)526751819 (DE-576)263014703 Trusted Computing gnd, s (DE-588)4293034-0 (DE-627)104199954 (DE-576)210933003 Zugriffskontrolle gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, DE-101, Fernández-Gago, Carmen (DE-627)1435288254 (DE-576)36528825X oth, 9783642299629, Buchausg. u.d.T. Security and trust management Berlin : Springer, 2012 X, 238 S. (DE-627)716645432 (DE-576)368549895 3642299628 9783642299629, Lecture notes in computer science 7170 7170 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-29963-6 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-29963-6 Verlag Volltext, https://swbplus.bsz-bw.de/bsz365272906cov.jpg V:DE-576 X:springer image/jpeg 20150929173751 Cover, https://zbmath.org/?q=an:1238.68017 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://deposit.d-nb.de/cgi-bin/dokserv?id=4004435&prov=M&dok_var=1&dok_ext=htm X: MVB text/html 2013-05-01 Verlag Inhaltstext, http://d-nb.info/1021362603/04 B:DE-101 application/pdf 2013-05-01 Verlag Inhaltsverzeichnis, (DE-627)715949705, http://dx.doi.org/10.1007/978-3-642-29963-6 DE-14, DE-14 epn:334942161X 2012-05-15T10:50:50Z, http://dx.doi.org/10.1007/978-3-642-29963-6 DE-15, DE-15 epn:3349421687 2012-05-15T10:50:50Z, http://dx.doi.org/10.1007/978-3-642-29963-6 DE-Ch1, DE-Ch1 epn:3349421741 2012-05-15T10:50:50Z, http://dx.doi.org/10.1007/978-3-642-29963-6 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3349421806 2012-11-10T04:25:31Z, http://dx.doi.org/10.1007/978-3-642-29963-6 DE-520, DE-520 epn:3349421865 2012-05-15T10:50:50Z
spellingShingle Meadows, Catherine, Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers, Lecture notes in computer science, 7170, This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies., Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic data processing, Computer networks ., Computers and civilization., Application software., Konferenzschrift 2011 Kopenhagen, Trusted Computing, Zugriffskontrolle, Privatsphäre
swb_id_str 365272906
title Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers
title_auth Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers
title_full Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers edited by Catherine Meadows, Carmen Fernandez-Gago
title_fullStr Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers edited by Catherine Meadows, Carmen Fernandez-Gago
title_full_unstemmed Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers edited by Catherine Meadows, Carmen Fernandez-Gago
title_in_hierarchy 7170. Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers (2012)
title_short Security and Trust Management
title_sort security and trust management 7th international workshop stm 2011 copenhagen denmark june 27 28 2011 revised selected papers
title_sub 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers
title_unstemmed Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers
topic Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic data processing, Computer networks ., Computers and civilization., Application software., Konferenzschrift 2011 Kopenhagen, Trusted Computing, Zugriffskontrolle, Privatsphäre
topic_facet Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic data processing, Computer networks ., Computers and civilization., Application software., Konferenzschrift, Trusted Computing, Zugriffskontrolle, Privatsphäre
url https://doi.org/10.1007/978-3-642-29963-6, http://dx.doi.org/10.1007/978-3-642-29963-6, https://swbplus.bsz-bw.de/bsz365272906cov.jpg, https://zbmath.org/?q=an:1238.68017, http://deposit.d-nb.de/cgi-bin/dokserv?id=4004435&prov=M&dok_var=1&dok_ext=htm, http://d-nb.info/1021362603/04