Data and applications security and privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer Berlin
2012
|
Schriftenreihe: | Lecture notes in computer science
7371 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIII, 329 S. Ill., graph. Darst. |
ISBN: | 3642315399 9783642315398 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040411008 | ||
003 | DE-604 | ||
005 | 20120925 | ||
007 | t| | ||
008 | 120910s2012 gw ad|| |||| 10||| eng d | ||
015 | |a 12,N24 |2 dnb | ||
016 | 7 | |a 1023016478 |2 DE-101 | |
020 | |a 3642315399 |9 3-642-31539-9 | ||
020 | |a 9783642315398 |c Print |9 978-3-642-31539-8 | ||
024 | 3 | |a 9783642315398 | |
028 | 5 | 2 | |a Best.-Nr.: 86124861 |
035 | |a (OCoLC)812264977 | ||
035 | |a (DE-599)DNB1023016478 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
111 | 2 | |a DBSec |n 26 |d 2012 |c Paris |j Verfasser |0 (DE-588)1025856376 |4 aut | |
245 | 1 | 0 | |a Data and applications security and privacy XXVI |b 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings |c Nora Cuppens-Boulahia ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer Berlin |c 2012 | |
300 | |a XIII, 329 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7371 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverwaltung |0 (DE-588)4011168-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chipkarte |0 (DE-588)4147723-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Paris |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Datenverwaltung |0 (DE-588)4011168-4 |D s |
689 | 0 | 5 | |a Chipkarte |0 (DE-588)4147723-6 |D s |
689 | 0 | 6 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Cuppens-Boulahia, Nora |e Sonstige |4 oth | |
710 | 2 | |a International Federation for Information Processing |b Working Group on Database Security |e Sonstige |0 (DE-588)5026302-X |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-31540-4 |
830 | 0 | |a Lecture notes in computer science |v 7371 |w (DE-604)BV000000607 |9 7371 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4052438&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025263964&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025263964 |
Datensatz im Suchindex
_version_ | 1820875411119144960 |
---|---|
adam_text |
IMAGE 1
TABLE O F C O N T E N T S
INVITED P A P E R
LOGICS FOR SECURITY AND PRIVACY 1
LEENDERT VAN DER TORRE
A C C E S S C O N T R O L
A USER-TO-USER RELATIONSHIP-BASED ACCESS CONTROL MODEL FOR ONLINE SOCIAL
NETWORKS 8
YUAN CHENG, JAEHONG PARK, AND RAVI SANDHU
AUTOMATED AND EFFICIENT ANALYSIS OF ROLE-BASED ACCESS CONTROL WITH
ATTRIBUTES 25
ALESSANDRO ARMANDO AND SILVIO RANISE
A UNIFIED ATTRIBUTE-BASED ACCESS CONTROL MODEL COVERING DAC, MAC AND
RBAC 41
X I N JIN, R A M KRISHNAN, AND RAVI SANDHU
C O N F I D E N T I A L I T Y A N D P R I V A C Y
SIGNATURE-BASED INFERENCE-USABILITY CONFINEMENT FOR RELATIONAL DATABASES
UNDER FUNCTIONAL AND JOIN DEPENDENCIES 56
JOACHIM BISKUP, SVEN HARTMANN, SEBASTIAN LINK, JAN-HENDRIK LOCHNER, AND
TORSTEN SCHLOTMANN
PRIVACY CONSENSUS IN ANONYMIZATION SYSTEMS VIA GAME THEORY 74
ROSA KARIMI ADL, MINA ASKARI, K E N BARKER, AND REIHANEH SAFAVI-NAINI
UNIFORM OBFUSCATION FOR LOCATION PRIVACY 90
GIANLUCA DINI AND PERICLE PERAZZO
S M A R T C A R D S S E C U R I T Y ( S H O R T P A P E R S )
SECURITY VULNERABILITIES OF USER AUTHENTICATION SCHEME USING SMART CARD
106
RAVI SINGH PIPPAL, JAIDHAR C.D., AND SHASHIKALA TAPASWI
SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITH NON-TAMPER
RESISTANT SMART CARDS 114
DING WANG, CHUN-GUANG MA, AND PENG WU
HTTP://D-NB.INFO/1023016478
IMAGE 2
XII TABLE OF CONTENTS
A FRIENDLY FRAMEWORK FOR HIDDING FAULT ENABLED VIRUS FOR JAVA BASED
SMARTCARD 122
TIANA RAZAFINDRALAMBO, GUILLAUME BOUFFARD, AND JEAN-LOUIS LANET
P R I V A C Y - P R E S E R V I N G T E C H N O L O G I E S
APPROXIMATE PRIVACY-PRESERVING D A T A MINING ON VERTICALLY PARTITIONED
D A T A 129
ROBERT NIX, MURAT KANTARCIOGLU, AND KEESOOK J. HAN
SECURITY LIMITATIONS OF USING SECRET SHARING FOR D A T A OUTSOURCING 145
JONATHAN L. DAUTRICH AND CHINYA V. RAVISHANKAR
PRIVACY-PRESERVING SUBGRAPH DISCOVERY 161
DANISH MEHMOOD, BASIT SHAFIQ, JAIDEEP VAIDYA, YUAN HONG, NABIL ADAM, AND
VIJAYALAKSHMI ATLURI
D A T A M A N A G E M E N T
DECENTRALIZED SEMANTIC THREAT GRAPHS 177
SIMON N. FOLEY AND WILLIAM M. FITZGERALD
CODE TYPE REVEALING USING EXPERIMENTS FRAMEWORK 193
RAMI SHARON AND EHUD GUDES
FROM MDM TO DB2: A CASE STUDY OF SECURITY ENFORCEMENT MIGRATION 207
NIKOLAY YAKOVETS, JAREK GRYZ, STEPHANIE HAZLEWOOD, AND PAUL VAN R U N
I N T R U S I O N A N D M A L W A R E
XSS-DEC: A HYBRID SOLUTION T O MITIGATE CROSS-SITE SCRIPTING ATTACKS. .
. 223 SMITHA SUNDARESWARAN AND A N N A CINZIA SQUICCIARINI
RANDOMIZING SMARTPHONE MALWARE PROFILES AGAINST STATISTICAL MINING
TECHNIQUES : 239
ABHIJITH SHASTRY, MURAT KANTARCIOGLU, YAN ZHOU, AND BHAVANI
THURAISINGHAM
P R O B A B I L I S T I C A T T A C K S A N D P R O T E C T I O N ( S H
O R T P A P E R S )
LAYERED SECURITY ARCHITECTURE FOR MASQUERADE ATTACK DETECTION 255 HAMED
SALJOOGHINEJAD AND WILSON NAIK BHUKYA
/C-ANONYMITY-BASED HORIZONTAL FRAGMENTATION TO PRESERVE PRIVACY IN D A T
A OUTSOURCING 263
ABBAS TAHERI SOODEJANI, MOHAMMAD ALI HADAVI, AND RASOOL JALILI
IMAGE 3
TABLE OF CONTENTS XIII
RECONSTRUCTION ATTACK THROUGH CLASSIFIER ANALYSIS 274
SEBASTIEN GAMBS, AHMED GMATI, AND MICHEL HURFIN
C L O U D C O M P U T I N G
DISTRIBUTED D A T A FEDERATION WITHOUT DISCLOSURE OF USER EXISTENCE 282
TAKAO TAKENOUCHI, TAKAHIRO KAWAMURA, AND AKIHIKO OHSUGA
IMPROVING VIRTUALIZATION SECURITY BY SPLITTING HYPERVISOR INTO SMALLER
COMPONENTS 298
WUQIONG PAN. YULONG ZHANG, MENG YU, AND JIWU JING
ENFORCING SUBSCRIPTION-BASED AUTHORIZATION POLICIES IN CLOUD SCENARIOS
314
SABRINA DE CAPITANI DI VIMERCATI, SARA FORESTI, SUSHIL JAJODIA, AND
GIOVANNI LIVRAGA
A U T H O R I N D E X 331 |
any_adam_object | 1 |
author_corporate | DBSec Paris |
author_corporate_role | aut |
author_facet | DBSec Paris |
author_sort | DBSec Paris |
building | Verbundindex |
bvnumber | BV040411008 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)812264977 (DE-599)DNB1023016478 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040411008</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120925</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120910s2012 gw ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N24</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1023016478</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642315399</subfield><subfield code="9">3-642-31539-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642315398</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-642-31539-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642315398</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86124861</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)812264977</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1023016478</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">DBSec</subfield><subfield code="n">26</subfield><subfield code="d">2012</subfield><subfield code="c">Paris</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1025856376</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data and applications security and privacy XXVI</subfield><subfield code="b">26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings</subfield><subfield code="c">Nora Cuppens-Boulahia ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer Berlin</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 329 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7371</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverwaltung</subfield><subfield code="0">(DE-588)4011168-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chipkarte</subfield><subfield code="0">(DE-588)4147723-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Paris</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Datenverwaltung</subfield><subfield code="0">(DE-588)4011168-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Chipkarte</subfield><subfield code="0">(DE-588)4147723-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cuppens-Boulahia, Nora</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Federation for Information Processing</subfield><subfield code="b">Working Group on Database Security</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)5026302-X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-31540-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7371</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7371</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4052438&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025263964&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025263964</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Paris gnd-content |
genre_facet | Konferenzschrift 2012 Paris |
id | DE-604.BV040411008 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:15:12Z |
institution | BVB |
institution_GND | (DE-588)1025856376 (DE-588)5026302-X |
isbn | 3642315399 9783642315398 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025263964 |
oclc_num | 812264977 |
open_access_boolean | |
owner | DE-706 DE-83 DE-11 |
owner_facet | DE-706 DE-83 DE-11 |
physical | XIII, 329 S. Ill., graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer Berlin |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | DBSec 26 2012 Paris Verfasser (DE-588)1025856376 aut Data and applications security and privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings Nora Cuppens-Boulahia ... (eds.) Berlin [u.a.] Springer Berlin 2012 XIII, 329 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7371 Datensicherung (DE-588)4011144-1 gnd rswk-swf Cloud Computing (DE-588)7623494-0 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Datenverwaltung (DE-588)4011168-4 gnd rswk-swf Chipkarte (DE-588)4147723-6 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Paris gnd-content Datensicherung (DE-588)4011144-1 s Zugriffskontrolle (DE-588)4293034-0 s Privatsphäre (DE-588)4123980-5 s Kryptoanalyse (DE-588)4830502-9 s Datenverwaltung (DE-588)4011168-4 s Chipkarte (DE-588)4147723-6 s Cloud Computing (DE-588)7623494-0 s DE-604 Cuppens-Boulahia, Nora Sonstige oth International Federation for Information Processing Working Group on Database Security Sonstige (DE-588)5026302-X oth Erscheint auch als Online-Ausgabe 978-3-642-31540-4 Lecture notes in computer science 7371 (DE-604)BV000000607 7371 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4052438&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025263964&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Data and applications security and privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Cloud Computing (DE-588)7623494-0 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Datenverwaltung (DE-588)4011168-4 gnd Chipkarte (DE-588)4147723-6 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)7623494-0 (DE-588)4293034-0 (DE-588)4123980-5 (DE-588)4830502-9 (DE-588)4011168-4 (DE-588)4147723-6 (DE-588)1071861417 |
title | Data and applications security and privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings |
title_auth | Data and applications security and privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings |
title_exact_search | Data and applications security and privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings |
title_full | Data and applications security and privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings Nora Cuppens-Boulahia ... (eds.) |
title_fullStr | Data and applications security and privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings Nora Cuppens-Boulahia ... (eds.) |
title_full_unstemmed | Data and applications security and privacy XXVI 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings Nora Cuppens-Boulahia ... (eds.) |
title_short | Data and applications security and privacy XXVI |
title_sort | data and applications security and privacy xxvi 26th annual ifip wg 11 3 conference dbsec 2012 paris france july 11 13 2012 proceedings |
title_sub | 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Cloud Computing (DE-588)7623494-0 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Datenverwaltung (DE-588)4011168-4 gnd Chipkarte (DE-588)4147723-6 gnd |
topic_facet | Datensicherung Cloud Computing Zugriffskontrolle Privatsphäre Kryptoanalyse Datenverwaltung Chipkarte Konferenzschrift 2012 Paris |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4052438&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025263964&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT dbsecparis dataandapplicationssecurityandprivacyxxvi26thannualifipwg113conferencedbsec2012parisfrancejuly11132012proceedings AT cuppensboulahianora dataandapplicationssecurityandprivacyxxvi26thannualifipwg113conferencedbsec2012parisfrancejuly11132012proceedings AT internationalfederationforinformationprocessingworkinggroupondatabasesecurity dataandapplicationssecurityandprivacyxxvi26thannualifipwg113conferencedbsec2012parisfrancejuly11132012proceedings |