Data and applications security and privacy XXV: 25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
6818 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XI, 308 S. Ill., graph. Darst. 24 cm |
ISBN: | 9783642223471 3642223478 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV039129428 | ||
003 | DE-604 | ||
005 | 20111104 | ||
007 | t| | ||
008 | 110711s2011 xx ad|| |||| 10||| eng d | ||
015 | |a 11,N24 |2 dnb | ||
016 | 7 | |a 1012631826 |2 DE-101 | |
020 | |a 9783642223471 |c kart. : ca. EUR 75.97 (DE) (freier Pr.), ca. sfr 102.00 (freier Pr.) |9 978-3-642-22347-1 | ||
020 | |a 3642223478 |9 3-642-22347-8 | ||
024 | 3 | |a 9783642223471 | |
028 | 5 | 2 | |a Best.-Nr.: 80073842 |
035 | |a (OCoLC)844922246 | ||
035 | |a (DE-599)DNB1012631826 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-11 |a DE-83 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Data and applications security and privacy XXV |b 25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings |c Yingjiu Li (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XI, 308 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6818 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Abfrage |0 (DE-588)4198788-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web |0 (DE-588)4363898-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenbanksystem |0 (DE-588)4113276-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Richmond Va. |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 2 | |a Abfrage |0 (DE-588)4198788-3 |D s |
689 | 0 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 5 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 0 | 6 | |a Datenbanksystem |0 (DE-588)4113276-2 |D s |
689 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Li, Yingjiu |e Sonstige |0 (DE-588)136886922 |4 oth | |
710 | 2 | |a International Federation for Information Processing |b Working Group on Database Security |e Sonstige |0 (DE-588)5026302-X |4 oth | |
711 | 2 | |a DBSec |n 25 |d 2011 |c Richmond, Va. |j Sonstige |0 (DE-588)16163641-X |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Data and Applications Security and Privacy XXV |
830 | 0 | |a Lecture notes in computer science |v 6818 |w (DE-604)BV000000607 |9 6818 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3838730&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024147812&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024147812 |
Datensatz im Suchindex
_version_ | 1820875329002012672 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
INVITED PAPERS INFORMATION FLOW CONTAINMENT: A PRACTICAL BASIS FOR
MALWARE DEFENSE 1
R. SEKAR
R E - D E S I G N I NG T HE W E B 'S A C C E SS C O N T R OL S Y S T EM
( E X T E N D ED A B S T R A C T ) . . . 4
WENLIANG DU, XI TAN, TONGBO LUO, KARTHICK JAYARAMAN, AND ZUTAO ZHU
INTEGRATED MANAGEMENT OF SECURITY POLICIES 12
STEFANO PARABOSCHI
ACCESS CONTROL I
COOPERATIVE DATA ACCESS IN MULTI-CLOUD ENVIRONMENTS 14
MEIXING LE, KRISHNA KANT, AND SUSHIL JAJODIA
MULTIPARTY AUTHORIZATION FRAMEWORK FOR DATA SHARING IN ONLINE SOCIAL
NETWORKS 29
HONGXIN HU AND GAIL-JOON AHN
PRIVACY-PRESERVING DATA APPLICATIONS I
ENFORCING CONFIDENTIALITY AND DATA VISIBILITY CONSTRAINTS: AN OBDD
APPROACH 44
VALENTINA CIRIANI, SABRINA DE CAPITANI DI VIMERCATI, SARA FORESTI,
GIOVANNI LIVRAGA, AND PIERANGELA SAMARATI
PUBLIC-KEY ENCRYPTED BLOOM FILTERS WITH APPLICATIONS TO SUPPLY CHAIN
INTEGRITY 60
FLORIAN KERSCHBAUM
ACCESS CONTROL II
AN OPTIMIZATION MODEL FOR THE EXTENDED ROLE MINING PROBLEM 76 EMRE UZUN,
VIJAYALAKSHMI ATLURI, HAIBING LU, AND JAIDEEP VAIDYA
DYNAMICS IN DELEGATION AND REVOCATION SCHEMES: A LOGICAL APPROACH 90
GUILLAUME AUCHER, STEVE BARKER, GUIDO BOELLA, VALERIO GENOVESE, AND
LEENDERT VAN DER TORRE
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1012631826
DIGITALISIERT DURCH
IMAGE 2
X TABLE OF CONTENTS
DATA CONFIDENTIALITY AND QUERY VERIFICATION
HISTORY-DEPENDENT INFERENCE CONTROL OF QUERIES BY DYNAMIC POLICY
ADAPTION 106
JOACHIM BISKUP
MULTILEVEL SECURE DATA STREAM PROCESSING 122
RAMAN ADAIKKALAVAN, INDRAKSHI RAY, AND XING XIE
QUERY AND DATA PRIVACY
QUERY PROCESSING IN PRIVATE DATA OUTSOURCING USING ANONYMIZATION . .
138 AHMET ERHAN NERGIZ AND CHRIS CLIFTON
PRIVATE DATABASE SEARCH WITH SUBLINEAR QUERY TIME 154
KEITH B. FRIKKEN AND BOYANG LI
PRIVACY-PRESERVING DATA APPLICATIONS II
EFFICIENT DISTRIBUTED LINEAR PROGRAMMING WITH LIMITED DISCLOSURE 170
YUAN HONG, JAIDEEP VAIDYA, AND HAIBING LU
PRIVACY-PRESERVING DATA MINING: A GAME-THEORETIC APPROACH 186 ATSUKO
MIYAJI AND MOHAMMAD SHAHRIAR RAHMAN
AUTHENTICATION AND SECRET SHARING
ENHANCING CARDSPACE AUTHENTICATION USING A MOBILE DEVICE 201 HAITHAM S.
AL-SINANI AND CHRIS J. MITCHELL
VERIFIABLE SECRET SHARING WITH COMPREHENSIVE AND EFFICIENT PUBLIC
VERIFICATION 217
KUN PENG
SHORT PAPERS
A ROBUST REMOTE USER AUTHENTICATION SCHEME AGAINST SMART CARD SECURITY
BREACH 231
CHUN-TA LI, CHENG-CHI LEE, CHEN-JU LIU, AND CHIN-WEN LEE
N-GRAM BASED SECURE SIMILAR DOCUMENT DETECTION 239
WEI JIANG AND BHARATH K. SAMANTHULA
AN INDEX STRUCTURE FOR PRIVATE DATA OUTSOURCING 247
AARON STEELE AND KEITH B. FRIKKEN
SELECTIVE DISCLOSURE ON ENCRYPTED DOCUMENTS 255
HAO LEI AND DENGGUO FENG
IMAGE 3
TABLE OF CONTENTS XI
A NEW LEAKAGE-RESILIENT IBE SCHEME IN THE RELATIVE LEAKAGE MODEL . .
263 YU CHEN, SONG LUO, AND ZHONG CHEN
ACCURATE ACCIDENT RECONSTRUCTION IN VANET 271
YULIYA KOPYLOVA, CSILLA FARKAS, AND WENYUAN XU
CYBER SITUATION AWARENESS: MODELING THE SECURITY ANALYST IN A
CYBER-ATTACK SCENARIO THROUGH INSTANCE-BASED LEARNING 280
VARUN DUTT, YOUNG-SUK AHN, AND CLEOTILDE GONZALEZ
LEVERAGING UML FOR SECURITY ENGINEERING AND ENFORCEMENT IN A
COLLABORATION ON DUTY AND ADAPTIVE WORKFLOW MODEL THAT EXTENDS NIST RBAC
293
SOLOMON BERHE, STEVEN DEMURJIAN, SWAPNA GOKHALE, JAIME PAVLICH-MARISCAL,
AND RISHI SARIPALLE
PRESERVING PRIVACY IN STRUCTURAL NEUROIMAGES 301
NAKEISHA SCHIMKE, MARY KUEHLER, AND JOHN HALE
AUTHOR INDEX 309 |
any_adam_object | 1 |
author_GND | (DE-588)136886922 |
building | Verbundindex |
bvnumber | BV039129428 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)844922246 (DE-599)DNB1012631826 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV039129428</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20111104</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">110711s2011 xx ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N24</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1012631826</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642223471</subfield><subfield code="c">kart. : ca. EUR 75.97 (DE) (freier Pr.), ca. sfr 102.00 (freier Pr.)</subfield><subfield code="9">978-3-642-22347-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642223478</subfield><subfield code="9">3-642-22347-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642223471</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80073842</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)844922246</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1012631826</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data and applications security and privacy XXV</subfield><subfield code="b">25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings</subfield><subfield code="c">Yingjiu Li (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 308 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6818</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Abfrage</subfield><subfield code="0">(DE-588)4198788-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Richmond Va.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Abfrage</subfield><subfield code="0">(DE-588)4198788-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Yingjiu</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)136886922</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Federation for Information Processing</subfield><subfield code="b">Working Group on Database Security</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)5026302-X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">DBSec</subfield><subfield code="n">25</subfield><subfield code="d">2011</subfield><subfield code="c">Richmond, Va.</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16163641-X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Data and Applications Security and Privacy XXV</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6818</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6818</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3838730&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024147812&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024147812</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Richmond Va. gnd-content |
genre_facet | Konferenzschrift 2011 Richmond Va. |
id | DE-604.BV039129428 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:13:54Z |
institution | BVB |
institution_GND | (DE-588)5026302-X (DE-588)16163641-X |
isbn | 9783642223471 3642223478 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024147812 |
oclc_num | 844922246 |
open_access_boolean | |
owner | DE-706 DE-11 DE-83 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-11 DE-83 DE-91G DE-BY-TUM |
physical | XI, 308 S. Ill., graph. Darst. 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Data and applications security and privacy XXV 25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings Yingjiu Li (ed.) Berlin [u.a.] Springer 2011 XI, 308 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6818 Literaturangaben Abfrage (DE-588)4198788-3 gnd rswk-swf World Wide Web (DE-588)4363898-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Datenbanksystem (DE-588)4113276-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 Richmond Va. gnd-content Datensicherung (DE-588)4011144-1 s Zugriffskontrolle (DE-588)4293034-0 s Abfrage (DE-588)4198788-3 s Privatsphäre (DE-588)4123980-5 s Kryptoanalyse (DE-588)4830502-9 s World Wide Web (DE-588)4363898-3 s Datenbanksystem (DE-588)4113276-2 s Anwendungssystem (DE-588)4139375-2 s DE-604 Li, Yingjiu Sonstige (DE-588)136886922 oth International Federation for Information Processing Working Group on Database Security Sonstige (DE-588)5026302-X oth DBSec 25 2011 Richmond, Va. Sonstige (DE-588)16163641-X oth Erscheint auch als Online-Ausgabe Data and Applications Security and Privacy XXV Lecture notes in computer science 6818 (DE-604)BV000000607 6818 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3838730&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024147812&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Data and applications security and privacy XXV 25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings Lecture notes in computer science Abfrage (DE-588)4198788-3 gnd World Wide Web (DE-588)4363898-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Datenbanksystem (DE-588)4113276-2 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Anwendungssystem (DE-588)4139375-2 gnd |
subject_GND | (DE-588)4198788-3 (DE-588)4363898-3 (DE-588)4830502-9 (DE-588)4113276-2 (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)4123980-5 (DE-588)4139375-2 (DE-588)1071861417 |
title | Data and applications security and privacy XXV 25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings |
title_auth | Data and applications security and privacy XXV 25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings |
title_exact_search | Data and applications security and privacy XXV 25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings |
title_full | Data and applications security and privacy XXV 25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings Yingjiu Li (ed.) |
title_fullStr | Data and applications security and privacy XXV 25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings Yingjiu Li (ed.) |
title_full_unstemmed | Data and applications security and privacy XXV 25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings Yingjiu Li (ed.) |
title_short | Data and applications security and privacy XXV |
title_sort | data and applications security and privacy xxv 25th annual ifip wg 11 3 conference dbsec 2011 richmond va usa july 11 13 2011 proceedings |
title_sub | 25th annual IFIP WG 11.3 conference, DBSec 2011, Richmond, VA, USA, July 11 - 13, 2011 ; proceedings |
topic | Abfrage (DE-588)4198788-3 gnd World Wide Web (DE-588)4363898-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Datenbanksystem (DE-588)4113276-2 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Anwendungssystem (DE-588)4139375-2 gnd |
topic_facet | Abfrage World Wide Web Kryptoanalyse Datenbanksystem Datensicherung Zugriffskontrolle Privatsphäre Anwendungssystem Konferenzschrift 2011 Richmond Va. |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3838730&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024147812&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT liyingjiu dataandapplicationssecurityandprivacyxxv25thannualifipwg113conferencedbsec2011richmondvausajuly11132011proceedings AT internationalfederationforinformationprocessingworkinggroupondatabasesecurity dataandapplicationssecurityandprivacyxxv25thannualifipwg113conferencedbsec2011richmondvausajuly11132011proceedings AT dbsecrichmondva dataandapplicationssecurityandprivacyxxv25thannualifipwg113conferencedbsec2011richmondvausajuly11132011proceedings |