|
|
|
|
LEADER |
09087cam a22020412 4500 |
001 |
0-1651540853 |
003 |
DE-627 |
005 |
20240122105052.0 |
007 |
cr uuu---uuuuu |
008 |
120704s2012 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642315404
|9 978-3-642-31540-4
|
024 |
7 |
|
|a 10.1007/978-3-642-31540-4
|2 doi
|
035 |
|
|
|a (DE-627)1651540853
|
035 |
|
|
|a (DE-576)367688085
|
035 |
|
|
|a (DE-599)BSZ367688085
|
035 |
|
|
|a (OCoLC)840010989
|
035 |
|
|
|a (OCoLC)802217899
|
035 |
|
|
|a (ZBM)1250.68020
|
035 |
|
|
|a (ZBM)1250.68020
|
035 |
|
|
|a (DE-He213)978-3-642-31540-4
|
035 |
|
|
|a (EBP)040543188
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *68-06
|2 msc
|
084 |
|
|
|a 68P25
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.64
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Cuppens-Boulahia, Nora
|4 aut
|
245 |
1 |
0 |
|a Data and Applications Security and Privacy XXVI
|b 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings
|c edited by Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2012
|
300 |
|
|
|a Online-Ressource (X, 340 p. 91 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7371
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Data mining
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Data mining
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Electronic data processing
|
655 |
|
7 |
|a Konferenzschrift
|y 2012
|z Paris
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
655 |
|
7 |
|a Konferenzschrift
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4293034-0
|0 (DE-627)104199954
|0 (DE-576)210933003
|a Zugriffskontrolle
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4123980-5
|0 (DE-627)105751111
|0 (DE-576)209564288
|a Privatsphäre
|2 gnd
|
689 |
0 |
3 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
0 |
4 |
|D s
|0 (DE-588)4011168-4
|0 (DE-627)106354116
|0 (DE-576)208892095
|a Datenverwaltung
|2 gnd
|
689 |
0 |
5 |
|D s
|0 (DE-588)4147723-6
|0 (DE-627)104696346
|0 (DE-576)209759097
|a Chipkarte
|2 gnd
|
689 |
0 |
5 |
|D s
|0 (DE-588)7623494-0
|0 (DE-627)577000314
|0 (DE-576)285431765
|a Cloud Computing
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4293034-0
|0 (DE-627)104199954
|0 (DE-576)210933003
|a Zugriffskontrolle
|2 gnd
|
689 |
1 |
2 |
|D s
|0 (DE-588)4198788-3
|0 (DE-627)10518604X
|0 (DE-576)210124318
|a Abfrage
|2 gnd
|
689 |
1 |
3 |
|D s
|0 (DE-588)4123980-5
|0 (DE-627)105751111
|0 (DE-576)209564288
|a Privatsphäre
|2 gnd
|
689 |
1 |
4 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
1 |
5 |
|D s
|0 (DE-588)4363898-3
|0 (DE-627)181366924
|0 (DE-576)211658502
|a World Wide Web
|2 gnd
|
689 |
1 |
6 |
|D s
|0 (DE-588)4113276-2
|0 (DE-627)105830550
|0 (DE-576)209475145
|a Datenbanksystem
|2 gnd
|
689 |
1 |
7 |
|D s
|0 (DE-588)4139375-2
|0 (DE-627)10477827X
|0 (DE-576)209693886
|a Anwendungssystem
|2 gnd
|
689 |
1 |
|
|5 (DE-627)
|
700 |
1 |
|
|a Cuppens, Frédéric
|4 oth
|
700 |
1 |
|
|a Garcia-Alfaro, Joaquin
|0 (DE-627)1388665042
|0 (DE-576)318665042
|4 oth
|
776 |
1 |
|
|z 9783642315398
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|a DBSec (26 : 2012 : Paris)
|t Data and applications security and privacy XXVI
|d [Berlin : Springer, 2012
|h XIII, 329 S.
|w (DE-627)717615154
|w (DE-576)382922387
|z 3642315399
|z 9783642315398
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7371
|9 7371
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-31540-4
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31540-4
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz367688085cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20130405112842
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1250.68020
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
856 |
4 |
2 |
|u http://deposit.d-nb.de/cgi-bin/dokserv?id=4052438&prov=M&dok_var=1&dok_ext=htm
|m X: MVB
|q text/html
|v 2013-05-01
|x Verlag
|3 Inhaltstext
|
889 |
|
|
|w (DE-627)718777972
|
912 |
|
|
|a ZDB-2-LNC
|b 2012
|
912 |
|
|
|a ZDB-2-SCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|b 2012
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.64
|j Datenbanken
|q SEPA
|0 (DE-627)106410865
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
900 |
|
|
|a Alfaro, Joaquin Garcia-
|
950 |
|
|
|a Access control
|
950 |
|
|
|a Zugangskontrolle
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Smart card
|
950 |
|
|
|a Integrated circuit card
|
950 |
|
|
|a IC Card
|
950 |
|
|
|a ICC
|
950 |
|
|
|a Prozessorchipkarte
|
950 |
|
|
|a Smartcard
|
950 |
|
|
|a Speicherkarte
|
950 |
|
|
|a Automatische Identifikation
|
950 |
|
|
|a Datenverarbeitungssystem
|
950 |
|
|
|a Anwendungssoftware
|
950 |
|
|
|a Прикладная система
|
950 |
|
|
|a Query
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Schutz der Privatsphäre
|
950 |
|
|
|a Persönlichkeitsrecht
|
950 |
|
|
|a 私人领域
|
950 |
|
|
|a 私隐
|
950 |
|
|
|a 私人領域
|
950 |
|
|
|a 私隱
|
950 |
|
|
|a Сфера личной жизни
|
950 |
|
|
|a Datenbankverwaltungssystem
|
950 |
|
|
|a DBMS
|
950 |
|
|
|a Datenbankbetriebssystem
|
950 |
|
|
|a Datenbank
|
950 |
|
|
|a Betriebssystem
|
950 |
|
|
|a Datenbankmanagementsystem
|
950 |
|
|
|a Data base management system
|
950 |
|
|
|a Data base system
|
950 |
|
|
|a Datenbanksoftware
|
950 |
|
|
|a Datenbankprogramm
|
950 |
|
|
|a Programm
|
950 |
|
|
|a Система базы данных
|
950 |
|
|
|a Datenmanagement
|
950 |
|
|
|a Dateiverwaltung
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Надёжность сохранения данных
|
950 |
|
|
|a WWW
|
950 |
|
|
|a Hypermedia
|
950 |
|
|
|a Internet
|
950 |
|
|
|a Всемирная сеть
|
950 |
|
|
|a World Wide Web
|
950 |
|
|
|a Cryptoanalysis
|
950 |
|
|
|a Angriff
|
950 |
|
|
|a Attacke
|
950 |
|
|
|a Kryptoanalytische Attacke
|
950 |
|
|
|a Kryptoanalytischer Angriff
|
950 |
|
|
|a Cryptanalysis
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Dechiffrierung
|
950 |
|
|
|a Cloud IT
|
950 |
|
|
|a Rechnerwolke
|
950 |
|
|
|a Verteiltes System
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31540-4
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3350033504
|z 2012-07-04T16:23:44Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31540-4
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3350033571
|z 2012-07-04T16:23:44Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31540-4
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:335003361X
|z 2012-07-04T16:23:44Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31540-4
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3350033679
|z 2012-07-04T16:23:44Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31540-4
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:335003375X
|z 2012-07-04T16:23:44Z
|
980 |
|
|
|a 1651540853
|b 0
|k 1651540853
|o 367688085
|
SOLR
_version_ |
1792253792663633920 |
access_facet |
Electronic Resources |
author |
Cuppens-Boulahia, Nora |
author2 |
Cuppens, Frédéric, Garcia-Alfaro, Joaquin |
author2_role |
oth, oth |
author2_variant |
f c fc, j g a jga |
author_facet |
Cuppens-Boulahia, Nora, Cuppens, Frédéric, Garcia-Alfaro, Joaquin |
author_role |
aut |
author_sort |
Cuppens-Boulahia, Nora |
author_variant |
n c b ncb |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing. |
ctrlnum |
(DE-627)1651540853, (DE-576)367688085, (DE-599)BSZ367688085, (OCoLC)840010989, (OCoLC)802217899, (ZBM)1250.68020, (DE-He213)978-3-642-31540-4, (EBP)040543188 |
de15_date |
2012-07-04T16:23:44Z |
dech1_date |
2012-07-04T16:23:44Z |
doi_str_mv |
10.1007/978-3-642-31540-4 |
era_facet |
2012 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Datensicherung, Zugriffskontrolle, Privatsphäre, Kryptoanalyse, Datenverwaltung, Chipkarte, Cloud Computing, Abfrage, World Wide Web, Datenbanksystem, Anwendungssystem |
finc_class_facet |
Informatik, Mathematik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2012 Paris (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Paris |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7371 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1651540853 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer Berlin Heidelberg, 2012 |
imprint_str_mv |
Berlin, Heidelberg: Springer Berlin Heidelberg, 2012 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1651540853 |
is_hierarchy_title |
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings |
isbn |
9783642315404 |
isbn_isn_mv |
9783642315398, 3642315399 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1651540853 |
language |
English |
last_indexed |
2024-02-29T17:06:48.005Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Data mining, Cryptography., Computer networks ., Application software., Electronic data processing, Datensicherung, Zugriffskontrolle, Privatsphäre, Kryptoanalyse, Datenverwaltung, Chipkarte, Cloud Computing, Abfrage, World Wide Web, Datenbanksystem, Anwendungssystem |
marc024a_ct_mv |
10.1007/978-3-642-31540-4 |
match_str |
cuppensboulahia2012dataandapplicationssecurityandprivacyxxvi26thannualifipwg113conferencedbsec2012parisfrancejuly11132012proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7371 |
names_id_str_mv |
(DE-627)1388665042, (DE-576)318665042 |
oclc_num |
840010989, 802217899 |
physical |
Online-Ressource (X, 340 p. 91 illus, digital) |
publishDate |
2012 |
publishDateSort |
2012 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer Berlin Heidelberg |
record_format |
marcfinc |
record_id |
367688085 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3140191 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7371 |
series2 |
Lecture Notes in Computer Science ; 7371, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Cuppens-Boulahia, Nora aut, Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings edited by Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro, Berlin, Heidelberg Springer Berlin Heidelberg 2012, Online-Ressource (X, 340 p. 91 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7371, SpringerLink Bücher, Literaturangaben, This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing., Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Data mining, Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift 2012 Paris (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4293034-0 (DE-627)104199954 (DE-576)210933003 Zugriffskontrolle gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, s (DE-588)4011168-4 (DE-627)106354116 (DE-576)208892095 Datenverwaltung gnd, s (DE-588)4147723-6 (DE-627)104696346 (DE-576)209759097 Chipkarte gnd, s (DE-588)7623494-0 (DE-627)577000314 (DE-576)285431765 Cloud Computing gnd, DE-101, s (DE-588)4198788-3 (DE-627)10518604X (DE-576)210124318 Abfrage gnd, s (DE-588)4363898-3 (DE-627)181366924 (DE-576)211658502 World Wide Web gnd, s (DE-588)4113276-2 (DE-627)105830550 (DE-576)209475145 Datenbanksystem gnd, s (DE-588)4139375-2 (DE-627)10477827X (DE-576)209693886 Anwendungssystem gnd, (DE-627), Cuppens, Frédéric oth, Garcia-Alfaro, Joaquin (DE-627)1388665042 (DE-576)318665042 oth, 9783642315398, Buchausg. u.d.T. DBSec (26 : 2012 : Paris) Data and applications security and privacy XXVI [Berlin : Springer, 2012 XIII, 329 S. (DE-627)717615154 (DE-576)382922387 3642315399 9783642315398, Lecture notes in computer science 7371 7371 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-31540-4 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-31540-4 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz367688085cov.jpg V:DE-576 X:springer image/jpeg 20130405112842 Cover, https://zbmath.org/?q=an:1250.68020 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://deposit.d-nb.de/cgi-bin/dokserv?id=4052438&prov=M&dok_var=1&dok_ext=htm X: MVB text/html 2013-05-01 Verlag Inhaltstext, (DE-627)718777972, http://dx.doi.org/10.1007/978-3-642-31540-4 DE-14, DE-14 epn:3350033504 2012-07-04T16:23:44Z, http://dx.doi.org/10.1007/978-3-642-31540-4 DE-15, DE-15 epn:3350033571 2012-07-04T16:23:44Z, http://dx.doi.org/10.1007/978-3-642-31540-4 DE-Ch1, DE-Ch1 epn:335003361X 2012-07-04T16:23:44Z, http://dx.doi.org/10.1007/978-3-642-31540-4 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3350033679 2012-07-04T16:23:44Z, http://dx.doi.org/10.1007/978-3-642-31540-4 DE-520, DE-520 epn:335003375X 2012-07-04T16:23:44Z |
spellingShingle |
Cuppens-Boulahia, Nora, Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings, Lecture notes in computer science, 7371, This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing., Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Data mining, Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift 2012 Paris, Konferenzschrift, Datensicherung, Zugriffskontrolle, Privatsphäre, Kryptoanalyse, Datenverwaltung, Chipkarte, Cloud Computing, Abfrage, World Wide Web, Datenbanksystem, Anwendungssystem |
swb_id_str |
367688085 |
title |
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings |
title_auth |
Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings |
title_full |
Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings edited by Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro |
title_fullStr |
Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings edited by Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro |
title_full_unstemmed |
Data and Applications Security and Privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings edited by Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro |
title_in_hierarchy |
7371. Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings (2012) |
title_short |
Data and Applications Security and Privacy XXVI |
title_sort |
data and applications security and privacy xxvi 26th annual ifip wg 11 3 conference dbsec 2012 paris france july 11 13 2012 proceedings |
title_sub |
26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings |
title_unstemmed |
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings |
topic |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Data mining, Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift 2012 Paris, Konferenzschrift, Datensicherung, Zugriffskontrolle, Privatsphäre, Kryptoanalyse, Datenverwaltung, Chipkarte, Cloud Computing, Abfrage, World Wide Web, Datenbanksystem, Anwendungssystem |
topic_facet |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Data mining, Cryptography., Computer networks ., Application software., Electronic data processing, Konferenzschrift, Datensicherung, Zugriffskontrolle, Privatsphäre, Kryptoanalyse, Datenverwaltung, Chipkarte, Cloud Computing, Abfrage, World Wide Web, Datenbanksystem, Anwendungssystem |
url |
https://doi.org/10.1007/978-3-642-31540-4, http://dx.doi.org/10.1007/978-3-642-31540-4, https://swbplus.bsz-bw.de/bsz367688085cov.jpg, https://zbmath.org/?q=an:1250.68020, http://deposit.d-nb.de/cgi-bin/dokserv?id=4052438&prov=M&dok_var=1&dok_ext=htm |