Information systems security: 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2008
|
Schriftenreihe: | Lecture notes in computer science
5352 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIII, 305 S. Ill., graph. Darst. 24 cm |
ISBN: | 9783540898610 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035191479 | ||
003 | DE-604 | ||
005 | 20090115 | ||
007 | t| | ||
008 | 081202s2008 xx ad|| |||| 10||| eng d | ||
015 | |a 08,N48,0020 |2 dnb | ||
016 | 7 | |a 991139593 |2 DE-101 | |
020 | |a 9783540898610 |c kart. : EUR 52.38 (freier Pr.), sfr 81.50 (freier Pr.) |9 978-3-540-89861-0 | ||
024 | 3 | |a 9783540898610 | |
028 | 5 | 2 | |a 12577231 |
035 | |a (OCoLC)276807196 | ||
035 | |a (DE-599)DNB991139593 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
245 | 1 | 0 | |a Information systems security |b 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings |c R. Sekar ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2008 | |
300 | |a XIII, 305 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5352 | |
500 | |a Literaturangaben | ||
650 | 4 | |a Eindringerkennung - Kongress - Hyderabad <Andhra Pradesh, 2008> | |
650 | 4 | |a Informationssystem - Serviceorientierte Architektur - Trusted Computing - Kongress - Hyderabad <Andhra Pradesh, 2008> | |
650 | 4 | |a Kryptoanalyse - Kongress - Hyderabad <Andhra Pradesh, 2008> | |
650 | 4 | |a Kryptologie - Kongress - Hyderabad <Andhra Pradesh, 2008> | |
650 | 4 | |a Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hyderabad <Andhra Pradesh, 2008> | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2008 |z Hyderabad Andhra Pradesh |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 2 | 1 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |D s |
689 | 2 | 2 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Sekar, R. |e Sonstige |4 oth | |
711 | 2 | |a ICISS |n 4 |d 2008 |c Hyderabad |j Sonstige |0 (DE-588)10365081-7 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5352 |w (DE-604)BV000000607 |9 5352 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016998085&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016998085 |
Datensatz im Suchindex
_version_ | 1820875105887059968 |
---|---|
adam_text |
DUC-PHONG LE, ALEXIS BONNECAZE, AND ALBAN GABILLON TABLE OF CONTENTS
KEYNOTE ADDRESS BITBLAZE: A NEW APPROACH TO COMPUTER SECURITY VIA BINARY
ANALYSIS DAWN SONG, DAVID BRUMLEY, HENG YIN, JUAN CABALLERO, IVAN JAGER,
MIN GYUNG KANG, ZHENKAI LIANG, JAMES NEWSOME, PONGSIN POOSANKAM, AND
PRATEEK SAXENA LANGUAGES AND FORMAI METHODS ON THE DECIDABILITY OF
MODEL-CHECKING INFORMATION FLOW PROPERTIES. 26 DEEPAK D'SOUZA,
RAVEENDRA HOLLA, JANARDHAN KULKARNI, RAGHAVENDRA K. RAMESH, AND BARBARA
SPRICK SYNTHESIZING ENFORCEMENT MONITORS WRT. THE SAFETY-PROGRESS
CLASSIFICATION OF PROPERTIES 41 YLIES FALCONE, JEAN-CLAUDE FERNANDEZ,
AND LAURENT MOUNIER IMPLICIT FLOWS: CAN'T LIVE WITH 'EM, CAN'T LIVE
WITHOUT 'EM 56 DAVE KING, BONIFACE HICKS, MICHAEL HICKS, AND TRENT
JAEGER PROTOCOLS A ROBUST REPUTATION SCHEME FOR DECENTRALIZED GROUP
MANAGEMENT SYSTEMS 71 FREDERIC CUPPENS, NORA CUPPENS-BOULAHIA, AND
JULIEN A. THOMAS COMPLEXITY OF CHECKING FRESHNESS OF CRYPTOGRAPHIE
PROTOCOLS 86 ZHIYAO LIANG AND RAKESH M. VERMA SECURE INTERNET VOTING
BASED ON PAPER BALLOTS 102 LUKASZ NITSCHKE SHORT PAPERS A SECURE
ROUND-BASED TIMESTAMPING SCHEME WITH ABSOLUTE TIMESTAMPS 116
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/991139593 DIGITALISIERT
DURCH XII TABLE OF CONTENTS A FRAMEWORK FOR TRUSTWORTHY SERVICE-ORIENTED
COMPUTING 124 SASIKANTH AVANCHA REVISITING BLUETOOTH SECURITY 132 MANIK
LAI DAS AND RAVI MUKKAMALA A VERIFICATION FRAMEWORK FOR TEMPORAL RBAC
WITH ROLE HIERARCHY . 140 SAMRAT MONDAI AND SHAMIK SURAL KEYNOTE
ADDRESS COMPUTING ON ENCRYPTED DATA (EXTENDED ABSTRACT) 148 AMIT SAHAI
ONGOING RESEARCH IDENTIFICATION OF CRYPTOGRAPHICALLY STRONG AND WEAK
PSEUDORANDOM BIT GENERATORS 154 NEELAM VERMA, PRASANNA R. MISHRA, AND
GIREESH PANDEY PROXY RE-SIGNATURE SCHEMES 156 N.R. SUNITHA AND B.B.
AMBERKER KEYNOTE ADDRESS FAST SIGNATURE MATCHING USING EXTENDED FINITE
AUTOMATON (XFA) 158 R. SMITH, C. ESTAN, S. JHA, AND I. SIAHAAN INTRUSION
DETECTION REAL-TIME ALERT CORRELATION WITH TYPE GRAPHS 173 GIANNI
TEDESCO AND UWE AICKELIN INCORPORATION OF APPLICATION LAYER PROTOCOL
SYNTAX INTO ANOMALY DETECTION 188 PATRICK DUSSEL, CHRISTIAN GEHL, PAVEL
LASKOV, AND KONRAD RIECK A PARALLEL ARCHITECTURE FOR STATEFUL,
HIGH-SPEED INTRUSION DETECTION . 203 LUCA FOSCHINI, ASHISH V.
THAPLIYAL, LORENZO CAVALLARO, CHRISTOPHER KRUEGEL, AND GIOVANNI VIGNA
BIOMETRIES, FORENSICS AND STEGANOGRAPHY INDEXING MULTIMODAL BIOMETRIE
DATABASES USING KD-TREE WITH FEATURE LEVE TABLE OF CONTENTS XIII AUDIO
WATERMARKING BASED ON QUANTIZATION IN WAVELET DOMAIN 235 VIVEKANANDA
BHAT K., INDRANIL SENGUPTA, AND ABHIJIT DAS OVERWRITING HARD DRIVE DATA:
THE GREAT WIPING CONTROVERSY 243 CRAIG WRIGHT, DAVE KLEIMAN, AND SHYAAM
SUNDHAR R.S. PRACTICAL APPLICATIONS OPTIMIZING THE BLOCK CIPHER AND
MODES OF OPERATIONS OVERHEAD AT THE LINK LAYER SECURITY FRAMEWORK IN THE
WIRELESS SENSOR NETWORKS . . . 258 DEVESH JINWALA, DHIREN PATEL, AND
KANKAR DASGUPTA PRIVACY MANAGEMENT FOR FACEBOOK 273 ENKH-AMGALAN
BAATARJAV, RAM DANTU, AND SANTI PHITHAKKITNUKOON HYDRO - HYBRID
DEVELOPMENT OF ROLES 287 LUDWIG FUCHS AND GUNTHER PERNUL KEYNOTE ADDRESS
THE ENLIGHTENED ERA OF ENTERPRISE SECURITY 303 BASANT RAJAN AUTHOR INDEX
307 |
adam_txt |
DUC-PHONG LE, ALEXIS BONNECAZE, AND ALBAN GABILLON TABLE OF CONTENTS
KEYNOTE ADDRESS BITBLAZE: A NEW APPROACH TO COMPUTER SECURITY VIA BINARY
ANALYSIS DAWN SONG, DAVID BRUMLEY, HENG YIN, JUAN CABALLERO, IVAN JAGER,
MIN GYUNG KANG, ZHENKAI LIANG, JAMES NEWSOME, PONGSIN POOSANKAM, AND
PRATEEK SAXENA LANGUAGES AND FORMAI METHODS ON THE DECIDABILITY OF
MODEL-CHECKING INFORMATION FLOW PROPERTIES. 26 DEEPAK D'SOUZA,
RAVEENDRA HOLLA, JANARDHAN KULKARNI, RAGHAVENDRA K. RAMESH, AND BARBARA
SPRICK SYNTHESIZING ENFORCEMENT MONITORS WRT. THE SAFETY-PROGRESS
CLASSIFICATION OF PROPERTIES 41 YLIES FALCONE, JEAN-CLAUDE FERNANDEZ,
AND LAURENT MOUNIER IMPLICIT FLOWS: CAN'T LIVE WITH 'EM, CAN'T LIVE
WITHOUT 'EM 56 DAVE KING, BONIFACE HICKS, MICHAEL HICKS, AND TRENT
JAEGER PROTOCOLS A ROBUST REPUTATION SCHEME FOR DECENTRALIZED GROUP
MANAGEMENT SYSTEMS 71 FREDERIC CUPPENS, NORA CUPPENS-BOULAHIA, AND
JULIEN A. THOMAS COMPLEXITY OF CHECKING FRESHNESS OF CRYPTOGRAPHIE
PROTOCOLS 86 ZHIYAO LIANG AND RAKESH M. VERMA SECURE INTERNET VOTING
BASED ON PAPER BALLOTS 102 LUKASZ NITSCHKE SHORT PAPERS A SECURE
ROUND-BASED TIMESTAMPING SCHEME WITH ABSOLUTE TIMESTAMPS 116
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/991139593 DIGITALISIERT
DURCH XII TABLE OF CONTENTS A FRAMEWORK FOR TRUSTWORTHY SERVICE-ORIENTED
COMPUTING 124 SASIKANTH AVANCHA REVISITING BLUETOOTH SECURITY 132 MANIK
LAI DAS AND RAVI MUKKAMALA A VERIFICATION FRAMEWORK FOR TEMPORAL RBAC
WITH ROLE HIERARCHY . 140 SAMRAT MONDAI AND SHAMIK SURAL KEYNOTE
ADDRESS COMPUTING ON ENCRYPTED DATA (EXTENDED ABSTRACT) 148 AMIT SAHAI
ONGOING RESEARCH IDENTIFICATION OF CRYPTOGRAPHICALLY STRONG AND WEAK
PSEUDORANDOM BIT GENERATORS 154 NEELAM VERMA, PRASANNA R. MISHRA, AND
GIREESH PANDEY PROXY RE-SIGNATURE SCHEMES 156 N.R. SUNITHA AND B.B.
AMBERKER KEYNOTE ADDRESS FAST SIGNATURE MATCHING USING EXTENDED FINITE
AUTOMATON (XFA) 158 R. SMITH, C. ESTAN, S. JHA, AND I. SIAHAAN INTRUSION
DETECTION REAL-TIME ALERT CORRELATION WITH TYPE GRAPHS 173 GIANNI
TEDESCO AND UWE AICKELIN INCORPORATION OF APPLICATION LAYER PROTOCOL
SYNTAX INTO ANOMALY DETECTION 188 PATRICK DUSSEL, CHRISTIAN GEHL, PAVEL
LASKOV, AND KONRAD RIECK A PARALLEL ARCHITECTURE FOR STATEFUL,
HIGH-SPEED INTRUSION DETECTION . 203 LUCA FOSCHINI, ASHISH V.
THAPLIYAL, LORENZO CAVALLARO, CHRISTOPHER KRUEGEL, AND GIOVANNI VIGNA
BIOMETRIES, FORENSICS AND STEGANOGRAPHY INDEXING MULTIMODAL BIOMETRIE
DATABASES USING KD-TREE WITH FEATURE LEVE TABLE OF CONTENTS XIII AUDIO
WATERMARKING BASED ON QUANTIZATION IN WAVELET DOMAIN 235 VIVEKANANDA
BHAT K., INDRANIL SENGUPTA, AND ABHIJIT DAS OVERWRITING HARD DRIVE DATA:
THE GREAT WIPING CONTROVERSY 243 CRAIG WRIGHT, DAVE KLEIMAN, AND SHYAAM
SUNDHAR R.S. PRACTICAL APPLICATIONS OPTIMIZING THE BLOCK CIPHER AND
MODES OF OPERATIONS OVERHEAD AT THE LINK LAYER SECURITY FRAMEWORK IN THE
WIRELESS SENSOR NETWORKS . . . 258 DEVESH JINWALA, DHIREN PATEL, AND
KANKAR DASGUPTA PRIVACY MANAGEMENT FOR FACEBOOK 273 ENKH-AMGALAN
BAATARJAV, RAM DANTU, AND SANTI PHITHAKKITNUKOON HYDRO - HYBRID
DEVELOPMENT OF ROLES 287 LUDWIG FUCHS AND GUNTHER PERNUL KEYNOTE ADDRESS
THE ENLIGHTENED ERA OF ENTERPRISE SECURITY 303 BASANT RAJAN AUTHOR INDEX
307 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV035191479 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 461f |
ctrlnum | (OCoLC)276807196 (DE-599)DNB991139593 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035191479</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090115</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">081202s2008 xx ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N48,0020</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">991139593</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540898610</subfield><subfield code="c">kart. : EUR 52.38 (freier Pr.), sfr 81.50 (freier Pr.)</subfield><subfield code="9">978-3-540-89861-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540898610</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12577231</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)276807196</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB991139593</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information systems security</subfield><subfield code="b">4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings</subfield><subfield code="c">R. Sekar ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 305 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5352</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Eindringerkennung - Kongress - Hyderabad <Andhra Pradesh, 2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informationssystem - Serviceorientierte Architektur - Trusted Computing - Kongress - Hyderabad <Andhra Pradesh, 2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptoanalyse - Kongress - Hyderabad <Andhra Pradesh, 2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptologie - Kongress - Hyderabad <Andhra Pradesh, 2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hyderabad <Andhra Pradesh, 2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2008</subfield><subfield code="z">Hyderabad Andhra Pradesh</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sekar, R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICISS</subfield><subfield code="n">4</subfield><subfield code="d">2008</subfield><subfield code="c">Hyderabad</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10365081-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5352</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5352</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016998085&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016998085</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2008 Hyderabad Andhra Pradesh gnd-content |
genre_facet | Konferenzschrift 2008 Hyderabad Andhra Pradesh |
id | DE-604.BV035191479 |
illustrated | Illustrated |
index_date | 2024-07-02T23:01:46Z |
indexdate | 2025-01-10T15:10:21Z |
institution | BVB |
institution_GND | (DE-588)10365081-7 |
isbn | 9783540898610 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016998085 |
oclc_num | 276807196 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XIII, 305 S. Ill., graph. Darst. 24 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information systems security 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings R. Sekar ... (ed.) Berlin [u.a.] Springer 2008 XIII, 305 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5352 Literaturangaben Eindringerkennung - Kongress - Hyderabad <Andhra Pradesh, 2008> Informationssystem - Serviceorientierte Architektur - Trusted Computing - Kongress - Hyderabad <Andhra Pradesh, 2008> Kryptoanalyse - Kongress - Hyderabad <Andhra Pradesh, 2008> Kryptologie - Kongress - Hyderabad <Andhra Pradesh, 2008> Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hyderabad <Andhra Pradesh, 2008> Computer security Congresses Computers Access control Congresses Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2008 Hyderabad Andhra Pradesh gnd-content Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Eindringerkennung (DE-588)4706627-1 s Informationssystem (DE-588)4072806-7 s Serviceorientierte Architektur (DE-588)4841015-9 s Trusted Computing (DE-588)7562931-8 s Kryptologie (DE-588)4033329-2 s Kryptoanalyse (DE-588)4830502-9 s Sekar, R. Sonstige oth ICISS 4 2008 Hyderabad Sonstige (DE-588)10365081-7 oth Lecture notes in computer science 5352 (DE-604)BV000000607 5352 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016998085&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information systems security 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings Lecture notes in computer science Eindringerkennung - Kongress - Hyderabad <Andhra Pradesh, 2008> Informationssystem - Serviceorientierte Architektur - Trusted Computing - Kongress - Hyderabad <Andhra Pradesh, 2008> Kryptoanalyse - Kongress - Hyderabad <Andhra Pradesh, 2008> Kryptologie - Kongress - Hyderabad <Andhra Pradesh, 2008> Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hyderabad <Andhra Pradesh, 2008> Computer security Congresses Computers Access control Congresses Kryptoanalyse (DE-588)4830502-9 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Informationssystem (DE-588)4072806-7 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4841015-9 (DE-588)4706627-1 (DE-588)4072806-7 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)7562931-8 (DE-588)1071861417 |
title | Information systems security 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings |
title_auth | Information systems security 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings |
title_exact_search | Information systems security 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings |
title_exact_search_txtP | Information systems security 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings |
title_full | Information systems security 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings R. Sekar ... (ed.) |
title_fullStr | Information systems security 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings R. Sekar ... (ed.) |
title_full_unstemmed | Information systems security 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings R. Sekar ... (ed.) |
title_short | Information systems security |
title_sort | information systems security 4th international conference iciss 2008 hyderabad india december 16 20 2008 proceedings |
title_sub | 4th international conference, ICISS 2008, Hyderabad, India, December 16 - 20, 2008 ; proceedings |
topic | Eindringerkennung - Kongress - Hyderabad <Andhra Pradesh, 2008> Informationssystem - Serviceorientierte Architektur - Trusted Computing - Kongress - Hyderabad <Andhra Pradesh, 2008> Kryptoanalyse - Kongress - Hyderabad <Andhra Pradesh, 2008> Kryptologie - Kongress - Hyderabad <Andhra Pradesh, 2008> Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hyderabad <Andhra Pradesh, 2008> Computer security Congresses Computers Access control Congresses Kryptoanalyse (DE-588)4830502-9 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Informationssystem (DE-588)4072806-7 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Eindringerkennung - Kongress - Hyderabad <Andhra Pradesh, 2008> Informationssystem - Serviceorientierte Architektur - Trusted Computing - Kongress - Hyderabad <Andhra Pradesh, 2008> Kryptoanalyse - Kongress - Hyderabad <Andhra Pradesh, 2008> Kryptologie - Kongress - Hyderabad <Andhra Pradesh, 2008> Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hyderabad <Andhra Pradesh, 2008> Computer security Congresses Computers Access control Congresses Kryptoanalyse Serviceorientierte Architektur Eindringerkennung Informationssystem Computersicherheit Kryptologie Datensicherung Rechnernetz Trusted Computing Konferenzschrift 2008 Hyderabad Andhra Pradesh |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016998085&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT sekarr informationsystemssecurity4thinternationalconferenceiciss2008hyderabadindiadecember16202008proceedings AT icisshyderabad informationsystemssecurity4thinternationalconferenceiciss2008hyderabadindiadecember16202008proceedings |