Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers / [electronic resource] :
edited by Catherine A. Meadows, Carmen Fernandez-Gago.
- 1st ed. 2012.
- X, 239 p. 29 illus. online resource.
- Security and Cryptology, 7170 2946-1863 ; .
- Security and Cryptology, 7170 .
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies.
9783642299636
10.1007/978-3-642-29963-6 doi
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks .
Computers and civilization.
Application software.
IT Operations.
Cryptology.
Data and Information Security.
Computer Communication Networks.
Computers and Society.
Computer and Information Systems Applications.
QA76.9.M3
004.068
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies.
9783642299636
10.1007/978-3-642-29963-6 doi
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks .
Computers and civilization.
Application software.
IT Operations.
Cryptology.
Data and Information Security.
Computer Communication Networks.
Computers and Society.
Computer and Information Systems Applications.
QA76.9.M3
004.068