Security Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | IFIP International Federation for Information Processing
330 |
Schlagworte: | |
Online-Zugang: | DE-634 DE-M347 DE-473 DE-703 DE-20 DE-706 DE-739 DE-355 Volltext Inhaltsverzeichnis |
Beschreibung: | 1 Online-Ressource (XVII, 312 S.) |
ISBN: | 3642152562 9783642152573 |
DOI: | 10.1007/978-3-642-15257-3 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036681213 | ||
003 | DE-604 | ||
005 | 20101116 | ||
007 | cr|uuu---uuuuu | ||
008 | 100921s2010 gw o|||| 00||| eng d | ||
015 | |a 10,N31 |2 dnb | ||
016 | 7 | |a 100500983X |2 DE-101 | |
020 | |a 3642152562 |9 3-642-15256-2 | ||
020 | |a 9783642152573 |c Online |9 978-3-642-15257-3 | ||
024 | 7 | |a 10.1007/978-3-642-15257-3 |2 doi | |
024 | 3 | |a 9783642152566 | |
028 | 5 | 2 | |a 80020507 |
035 | |a (OCoLC)1165494386 | ||
035 | |a (DE-599)DNB100500983X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-M347 |a DE-473 |a DE-20 |a DE-703 |a DE-739 |a DE-706 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Security Privacy - Silver Linings in the Cloud |b 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings |c Kai Rannenberg ... (Eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a 1 Online-Ressource (XVII, 312 S.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a IFIP International Federation for Information Processing |v 330 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Brisbane |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Rannenberg, Kai |d 1964- |e Sonstige |0 (DE-588)132840103 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-3-642-15256-6 |
830 | 0 | |a IFIP International Federation for Information Processing |v 330 |w (DE-604)BV035839733 |9 330 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-15257-3 |x Verlag |3 Volltext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020600078&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2010 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020600078 | |
966 | e | |u https://doi.org/10.1007/978-3-642-15257-3 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-15257-3 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-15257-3 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-15257-3 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-15257-3 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-15257-3 |l DE-706 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-15257-3 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-15257-3 |l DE-355 |p ZDB-2-SCS |q UBR Paketkauf 2024 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1823676296838774784 |
---|---|
adam_text |
TABLE OF CONTENTS KRISTIAN BEEKMAN AWARD AWARDEE KEYNOTE THE 5 WAVES OF
INFORMATION SECURITY - FROM KRISTIAN BEEKMAN TO THE PRESENT 1 S.H.
(BASIE) VON SOLMS SECURITY MANAGEMENT A BUSINESS CONTINUITY MANAGEMENT
SIMULATOR 9 WILLIAM J. CAELLI, LAM-FOR KWOK, AND DENNIS LONGLEY MINING
BUSINESS-RELEVANT RBAC STATES THROUGH DECOMPOSITION 19 ALESSANDRO
COLANTONIO, ROBERTO DI PIETRO, ALBERTO OCELLO, AND NINO VINCENZO VERDE
GROUP DYNAMICS IN A SECURITY RISK MANAGEMENT TEAM CONTEXT: A TEACHING
CASE STUDY 31 ROSTYSLAV BARABANOV AND STEWART KOWALSKI SECURITY
MANAGEMENT & GOVERNANCE USING ACTOR NETWORK THEORY TO UNDERSTAND
INFORMATION SECURITY MANAGEMENT 43 KARIN HEDSTROEM, GURPREET DHILLON, AND
FREDRIK KARLSSON INFORMATION SECURITY GOVERNANCE: WHEN COMPLIANCE
BECOMES MORE IMPORTANT THAN SECURITY 55 TERENCE C.C. TAN, ANTHONIE B.
RUIGHAVER, AND ATIF AHMAD NETWORK SECURITY & AUTHENTICATION
UNDERSTANDING DOMAIN REGISTRATION ABUSES 68 SCOTT E. COULL, ANDREW M.
WHITE, TING-FANG YEN, FABIAN MONROSE, AND MICHAEL K. REITER WHO ON EARTH
IS "MR. CYPHER" : AUTOMATED FRIEND INJECTION ATTACKS ON SOCIAL
NETWORKING SITES 80 MARKUS HUBER, MARTIN MULAZZANI, AND EDGAR WEIPPL
AUTHENTIC REFINEMENT OF SEMANTICALLY ENHANCED POLICIES IN PERVASIVE
SYSTEM BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/100500983X
DIGITALISIERT DURCH XVI TABLE OF CONTENTS QUALIFIED MOBILE SERVER
SIGNATURE 103 CLEMENS ORTHACKER, MARTIN CENTNER, AND CHRISTIAN KITTL
INTRUSION DETECTION, TRUST MANAGEMENT, AND MODELS FRAUD DETECTION IN ERP
SYSTEMS USING SCENARIO MATCHING 112 ASADUL KHANDOKER ISLAM, MALCOM
CORNEY, GEORGE MOHAY, ANDREW CLARK, SHANE BRACHER, TOBIAS RAUB, AND
ULRICH FLEGEL USE OF IP ADDRESSES FOR HIGH RATE FLOODING ATTACK
DETECTION 124 EJAZ AHMED, GEORGE MOHAY, ALAN TICKLE, AND SAJAL BHATIA
AUGMENTING REPUTATION-BASED TRUST METRICS WITH RUMOR-LIKE DISSEMINATION
OF REPUTATION INFORMATION 136 SASCHA HAUKE, MARTIN PYKA, MARKUS
BORSCHBACH, AND DOMINIK HEIDER EX-SDF: AN EXTENDED SERVICE DEPENDENCY
FRAMEWORK FOR INTRUSION IMPACT ASSESSMENT 148 NIZAR KHEIR, NORA
CUPPENS-BOULAHIA, FREDERIC CUPPENS, AND HERVE DEBAR SOFTWARE SECURITY
AND ASSURANCE A DYNAMIC AND UBIQUITOUS SMART CARD SECURITY ASSURANCE AND
VALIDATION MECHANISM 161 RAJA NAEEM AKRAM, KONSTANTINOS MARKANTONAKIS,
AND KEITH MAYES ON-THE-FLY INLINING OF DYNAMIC SECURITY MONITORS 173
JONAS MAGAZINIUS, ALEJANDRO RUSSO, AND ANDREI SABELFELD A METRIC-BASED
SCHEME FOR EVALUATING TAMPER RESISTANT SOFTWARE SYSTEMS 187 GIDEON MYLES
AND HONGXIA JIN EVALUATION OF THE OFFENSIVE APPROACH IN INFORMATION
SECURITY EDUCATIO AUTHOR INDEX 311 TABLE OF CONTENTS XVII ACCESS CONTROL
AND PRIVACY PURPOSE-BASED ACCESS CONTROL POLICIES AND CONFLICTING
ANALYSIS 217 HUA WANG, LILI SUN, AND VIJAY VARADHARAJAN DELEGATION IN
PREDICATE ENCRYPTION SUPPORTING DISJUNCTIVE QUERIES . 229 DONGDONG
SUN, COLIN BOYD, AND JUAN MANUEL GONZALEZ NIETO TAGGING DISCLOSURES OF
PERSONAL DATA TO THIRD PARTIES TO PRESERVE PRIVACY 241 SVEN WOHLGEMUTH,
ISAO ECHIZEN, NOBORU SONEHARA, AND GUENTER MUELLER K-SHARES: A PRIVACY
PRESERVING REPUTATION PROTOCOL FOR DECENTRALIZED ENVIRONMENTS 253 OMAR
HASAN, LIONEL BRUNIE, AND ELISA BERLINO PRIVACY TOWARDS FAIR INDICTMENT
FOR DATA COLLECTION WITH SELF-ENFORCING PRIVACY 265 MARK STEGELMANN HOW
TO ENHANCE PRIVACY AND IDENTITY MANAGEMENT FOR MOBILE COMMUNITIES:
APPROACH AND USER DRIVEN CONCEPTS OF THE PICOS PROJECT 277 CHRISTIAN
KAHL, KATJA BOETTCHER, MARKUS TSCHERSICH, STEPHAN HEIM, AND KAI
RANNENBERG PERFORMANCE ANALYSIS OF ACCUMULATOR-BASED REVOCATION
MECHANISMS . 289 JOERN LAPON, MARKULF KOHLWEISS, BART DE DECKER, AND
VINCENT NAESSENS APPENDIX IFIP TECHNICAL COMMITTEE 11 SECURITY AND
PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS 302 KAI RANNENBERG,
S.H. (BASIE) VON SOLMS, AND LEON STROUS |
any_adam_object | 1 |
author_GND | (DE-588)132840103 |
building | Verbundindex |
bvnumber | BV036681213 |
classification_rvk | ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)1165494386 (DE-599)DNB100500983X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-15257-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036681213</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20101116</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">100921s2010 gw o|||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N31</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">100500983X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642152562</subfield><subfield code="9">3-642-15256-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642152573</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-15257-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-15257-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642152566</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">80020507</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1165494386</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB100500983X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security Privacy - Silver Linings in the Cloud</subfield><subfield code="b">25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings</subfield><subfield code="c">Kai Rannenberg ... (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 312 S.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IFIP International Federation for Information Processing</subfield><subfield code="v">330</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Brisbane</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rannenberg, Kai</subfield><subfield code="d">1964-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)132840103</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-3-642-15256-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IFIP International Federation for Information Processing</subfield><subfield code="v">330</subfield><subfield code="w">(DE-604)BV035839733</subfield><subfield code="9">330</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-15257-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020600078&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2010</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020600078</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-15257-3</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-15257-3</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-15257-3</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-15257-3</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-15257-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-15257-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-15257-3</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-15257-3</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">UBR Paketkauf 2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Brisbane gnd-content |
genre_facet | Konferenzschrift 2010 Brisbane |
id | DE-604.BV036681213 |
illustrated | Not Illustrated |
indexdate | 2025-02-10T13:14:04Z |
institution | BVB |
isbn | 3642152562 9783642152573 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020600078 |
oclc_num | 1165494386 |
open_access_boolean | |
owner | DE-M347 DE-473 DE-BY-UBG DE-20 DE-703 DE-739 DE-706 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-M347 DE-473 DE-BY-UBG DE-20 DE-703 DE-739 DE-706 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVII, 312 S.) |
psigel | ZDB-2-SCS ZDB-2-SCS_2010 ZDB-2-SCS UBR Paketkauf 2024 |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | IFIP International Federation for Information Processing |
series2 | IFIP International Federation for Information Processing |
spelling | Security Privacy - Silver Linings in the Cloud 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings Kai Rannenberg ... (Eds.) Berlin [u.a.] Springer 2010 1 Online-Ressource (XVII, 312 S.) txt rdacontent c rdamedia cr rdacarrier IFIP International Federation for Information Processing 330 Datensicherung (DE-588)4011144-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Brisbane gnd-content Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Privatsphäre (DE-588)4123980-5 s Kryptosystem (DE-588)4209132-9 s DE-604 Rannenberg, Kai 1964- Sonstige (DE-588)132840103 oth Erscheint auch als Druck-Ausgabe, Hardcover 978-3-642-15256-6 IFIP International Federation for Information Processing 330 (DE-604)BV035839733 330 https://doi.org/10.1007/978-3-642-15257-3 Verlag Volltext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020600078&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Security Privacy - Silver Linings in the Cloud 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings IFIP International Federation for Information Processing Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4123980-5 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)1071861417 |
title | Security Privacy - Silver Linings in the Cloud 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings |
title_auth | Security Privacy - Silver Linings in the Cloud 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings |
title_exact_search | Security Privacy - Silver Linings in the Cloud 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings |
title_full | Security Privacy - Silver Linings in the Cloud 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings Kai Rannenberg ... (Eds.) |
title_fullStr | Security Privacy - Silver Linings in the Cloud 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings Kai Rannenberg ... (Eds.) |
title_full_unstemmed | Security Privacy - Silver Linings in the Cloud 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings Kai Rannenberg ... (Eds.) |
title_short | Security Privacy - Silver Linings in the Cloud |
title_sort | security privacy silver linings in the cloud 25th ifip tc 11 international information security conference sec 2010 held as a part of wcc 2010 brisbane australia september 20 23 2010 proceedings |
title_sub | 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, 2010 ; Proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Datensicherung Privatsphäre Kryptosystem Computersicherheit Konferenzschrift 2010 Brisbane |
url | https://doi.org/10.1007/978-3-642-15257-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020600078&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV035839733 |
work_keys_str_mv | AT rannenbergkai securityprivacysilverliningsinthecloud25thifiptc11internationalinformationsecurityconferencesec2010heldasapartofwcc2010brisbaneaustraliaseptember20232010proceedings |