000 | 03321nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-642-31540-4 | ||
003 | DE-He213 | ||
005 | 20240730183700.0 | ||
007 | cr nn 008mamaa | ||
008 | 120625s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642315404 _9978-3-642-31540-4 |
||
024 | 7 |
_a10.1007/978-3-642-31540-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aData and Applications Security and Privacy XXVI _h[electronic resource] : _b26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012, Proceedings / _cedited by Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia-Alfaro. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aX, 340 p. 91 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v7371 |
|
520 | _aThis book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9132960 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aApplication software. _9132961 |
|
650 | 0 |
_aData mining. _93907 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _9132962 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9132963 |
650 | 2 | 4 |
_aData Mining and Knowledge Discovery. _9132964 |
700 | 1 |
_aCuppens-Boulahia, Nora. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9132965 |
|
700 | 1 |
_aCuppens, Frederic. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9132966 |
|
700 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9132967 |
|
710 | 2 |
_aSpringerLink (Online service) _9132968 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642315398 |
776 | 0 | 8 |
_iPrinted edition: _z9783642315411 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v7371 _9132969 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-31540-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c91982 _d91982 |