|
|
|
|
LEADER |
06397cam a22013332 4500 |
001 |
0-165147690X |
003 |
DE-627 |
005 |
20240122105109.0 |
007 |
cr uuu---uuuuu |
008 |
120515s2012 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642299636
|9 978-3-642-29963-6
|
024 |
7 |
|
|a 10.1007/978-3-642-29963-6
|2 doi
|
035 |
|
|
|a (DE-627)165147690X
|
035 |
|
|
|a (DE-576)365272906
|
035 |
|
|
|a (DE-599)BSZ365272906
|
035 |
|
|
|a (OCoLC)799086386
|
035 |
|
|
|a (ZBM)1238.68017
|
035 |
|
|
|a (ZBM)1238.68017
|
035 |
|
|
|a (DE-He213)978-3-642-29963-6
|
035 |
|
|
|a (EBP)040542130
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.M3
|
072 |
|
7 |
|a UYZM
|2 bicssc
|
072 |
|
7 |
|a UKR
|2 bicssc
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
072 |
|
7 |
|a BUS083000
|2 bisacsh
|
072 |
|
7 |
|a KJQ
|2 bicssc
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *68-06
|2 msc
|
084 |
|
|
|a 68P25
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Meadows, Catherine
|4 aut
|
245 |
1 |
0 |
|a Security and Trust Management
|b 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers
|c edited by Catherine Meadows, Carmen Fernandez-Gago
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2012
|
300 |
|
|
|a Online-Ressource (X, 239p, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7170
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Application software.
|
655 |
|
7 |
|a Konferenzschrift
|y 2011
|z Kopenhagen
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)7562931-8
|0 (DE-627)526751819
|0 (DE-576)263014703
|a Trusted Computing
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4293034-0
|0 (DE-627)104199954
|0 (DE-576)210933003
|a Zugriffskontrolle
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4123980-5
|0 (DE-627)105751111
|0 (DE-576)209564288
|a Privatsphäre
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
700 |
1 |
|
|a Fernández-Gago, Carmen
|0 (DE-627)1435288254
|0 (DE-576)36528825X
|4 oth
|
776 |
1 |
|
|z 9783642299629
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Security and trust management
|d Berlin : Springer, 2012
|h X, 238 S.
|w (DE-627)716645432
|w (DE-576)368549895
|z 3642299628
|z 9783642299629
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7170
|9 7170
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-29963-6
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-29963-6
|x Verlag
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz365272906cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20150929173751
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1238.68017
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
856 |
4 |
2 |
|u http://deposit.d-nb.de/cgi-bin/dokserv?id=4004435&prov=M&dok_var=1&dok_ext=htm
|m X: MVB
|q text/html
|v 2013-05-01
|x Verlag
|3 Inhaltstext
|
856 |
4 |
2 |
|u http://d-nb.info/1021362603/04
|m B:DE-101
|q application/pdf
|v 2013-05-01
|x Verlag
|3 Inhaltsverzeichnis
|
889 |
|
|
|w (DE-627)715949705
|
912 |
|
|
|a ZDB-2-LNC
|b 2012
|
912 |
|
|
|a ZDB-2-SCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|b 2012
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
900 |
|
|
|a Gago, Carmen Fernández-
|
950 |
|
|
|a Access control
|
950 |
|
|
|a Zugangskontrolle
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Schutz der Privatsphäre
|
950 |
|
|
|a Persönlichkeitsrecht
|
950 |
|
|
|a 私人领域
|
950 |
|
|
|a 私隐
|
950 |
|
|
|a 私人領域
|
950 |
|
|
|a 私隱
|
950 |
|
|
|a Сфера личной жизни
|
950 |
|
|
|a Informationstechnik
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Vertrauenswürdigkeit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Sealed Cloud
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-29963-6
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:334942161X
|z 2012-05-15T10:50:50Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-29963-6
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3349421687
|z 2012-05-15T10:50:50Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-29963-6
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3349421741
|z 2012-05-15T10:50:50Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-29963-6
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3349421806
|z 2012-11-10T04:25:31Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-29963-6
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3349421865
|z 2012-05-15T10:50:50Z
|
980 |
|
|
|a 165147690X
|b 0
|k 165147690X
|o 365272906
|
SOLR
_version_ |
1792253784256151552 |
access_facet |
Electronic Resources |
author |
Meadows, Catherine |
author2 |
Fernández-Gago, Carmen |
author2_role |
oth |
author2_variant |
c f g cfg |
author_facet |
Meadows, Catherine, Fernández-Gago, Carmen |
author_role |
aut |
author_sort |
Meadows, Catherine |
author_variant |
c m cm |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.M3 |
callnumber-search |
QA76.9.M3 |
callnumber-sort |
QA 276.9 M3 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies. |
ctrlnum |
(DE-627)165147690X, (DE-576)365272906, (DE-599)BSZ365272906, (OCoLC)799086386, (ZBM)1238.68017, (DE-He213)978-3-642-29963-6, (EBP)040542130 |
de15_date |
2012-05-15T10:50:50Z |
dech1_date |
2012-05-15T10:50:50Z |
doi_str_mv |
10.1007/978-3-642-29963-6 |
era_facet |
2011 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Trusted Computing, Zugriffskontrolle, Privatsphäre |
finc_class_facet |
Informatik, Wirtschaftswissenschaften, Mathematik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2011 Kopenhagen (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Kopenhagen |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7170 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-165147690X |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer Berlin Heidelberg, 2012 |
imprint_str_mv |
Berlin, Heidelberg: Springer Berlin Heidelberg, 2012 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-165147690X |
is_hierarchy_title |
Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers |
isbn |
9783642299636 |
isbn_isn_mv |
9783642299629, 3642299628 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
165147690X |
language |
English |
last_indexed |
2024-02-29T17:06:40.975Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic data processing, Computer networks ., Computers and civilization., Application software., Trusted Computing, Zugriffskontrolle, Privatsphäre |
marc024a_ct_mv |
10.1007/978-3-642-29963-6 |
match_str |
meadows2012securityandtrustmanagement7thinternationalworkshopstm2011copenhagendenmarkjune27282011revisedselectedpapers |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7170 |
names_id_str_mv |
(DE-627)1435288254, (DE-576)36528825X |
oclc_num |
799086386 |
physical |
Online-Ressource (X, 239p, digital) |
publishDate |
2012 |
publishDateSort |
2012 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer Berlin Heidelberg |
record_format |
marcfinc |
record_id |
365272906 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3088249 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7170 |
series2 |
Lecture Notes in Computer Science ; 7170, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Meadows, Catherine aut, Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers edited by Catherine Meadows, Carmen Fernandez-Gago, Berlin, Heidelberg Springer Berlin Heidelberg 2012, Online-Ressource (X, 239p, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7170, SpringerLink Bücher, Literaturangaben, This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies., Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic data processing, Computer networks ., Computers and civilization., Application software., Konferenzschrift 2011 Kopenhagen (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)7562931-8 (DE-627)526751819 (DE-576)263014703 Trusted Computing gnd, s (DE-588)4293034-0 (DE-627)104199954 (DE-576)210933003 Zugriffskontrolle gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, DE-101, Fernández-Gago, Carmen (DE-627)1435288254 (DE-576)36528825X oth, 9783642299629, Buchausg. u.d.T. Security and trust management Berlin : Springer, 2012 X, 238 S. (DE-627)716645432 (DE-576)368549895 3642299628 9783642299629, Lecture notes in computer science 7170 7170 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-29963-6 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-29963-6 Verlag Volltext, https://swbplus.bsz-bw.de/bsz365272906cov.jpg V:DE-576 X:springer image/jpeg 20150929173751 Cover, https://zbmath.org/?q=an:1238.68017 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://deposit.d-nb.de/cgi-bin/dokserv?id=4004435&prov=M&dok_var=1&dok_ext=htm X: MVB text/html 2013-05-01 Verlag Inhaltstext, http://d-nb.info/1021362603/04 B:DE-101 application/pdf 2013-05-01 Verlag Inhaltsverzeichnis, (DE-627)715949705, http://dx.doi.org/10.1007/978-3-642-29963-6 DE-14, DE-14 epn:334942161X 2012-05-15T10:50:50Z, http://dx.doi.org/10.1007/978-3-642-29963-6 DE-15, DE-15 epn:3349421687 2012-05-15T10:50:50Z, http://dx.doi.org/10.1007/978-3-642-29963-6 DE-Ch1, DE-Ch1 epn:3349421741 2012-05-15T10:50:50Z, http://dx.doi.org/10.1007/978-3-642-29963-6 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3349421806 2012-11-10T04:25:31Z, http://dx.doi.org/10.1007/978-3-642-29963-6 DE-520, DE-520 epn:3349421865 2012-05-15T10:50:50Z |
spellingShingle |
Meadows, Catherine, Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers, Lecture notes in computer science, 7170, This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies., Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic data processing, Computer networks ., Computers and civilization., Application software., Konferenzschrift 2011 Kopenhagen, Trusted Computing, Zugriffskontrolle, Privatsphäre |
swb_id_str |
365272906 |
title |
Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers |
title_auth |
Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers |
title_full |
Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers edited by Catherine Meadows, Carmen Fernandez-Gago |
title_fullStr |
Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers edited by Catherine Meadows, Carmen Fernandez-Gago |
title_full_unstemmed |
Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers edited by Catherine Meadows, Carmen Fernandez-Gago |
title_in_hierarchy |
7170. Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers (2012) |
title_short |
Security and Trust Management |
title_sort |
security and trust management 7th international workshop stm 2011 copenhagen denmark june 27 28 2011 revised selected papers |
title_sub |
7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers |
title_unstemmed |
Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers |
topic |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic data processing, Computer networks ., Computers and civilization., Application software., Konferenzschrift 2011 Kopenhagen, Trusted Computing, Zugriffskontrolle, Privatsphäre |
topic_facet |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic data processing, Computer networks ., Computers and civilization., Application software., Konferenzschrift, Trusted Computing, Zugriffskontrolle, Privatsphäre |
url |
https://doi.org/10.1007/978-3-642-29963-6, http://dx.doi.org/10.1007/978-3-642-29963-6, https://swbplus.bsz-bw.de/bsz365272906cov.jpg, https://zbmath.org/?q=an:1238.68017, http://deposit.d-nb.de/cgi-bin/dokserv?id=4004435&prov=M&dok_var=1&dok_ext=htm, http://d-nb.info/1021362603/04 |