Trustworthy computing and services: International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Heidelberg, Dordrecht, London, New York
Springer
[2013]
|
Schriftenreihe: | Communications in computer and information science
320 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHM01 FHN01 FKE01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XVII, 739 Seiten) |
ISBN: | 9783642357947 9783642357954 |
DOI: | 10.1007/978-3-642-35795-4 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV040897309 | ||
003 | DE-604 | ||
005 | 20220713 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 130319s2013 |||| o||u| ||||||eng d | ||
015 | |a 13,O02 |2 dnb | ||
016 | 7 | |a 1029408157 |2 DE-101 | |
020 | |a 9783642357947 |9 978-3-642-35794-7 | ||
020 | |a 9783642357954 |c Online |9 978-3-642-35795-4 | ||
024 | 7 | |a 10.1007/978-3-642-35795-4 |2 doi | |
024 | 3 | |a 9783642357954 | |
035 | |a (OCoLC)829740315 | ||
035 | |a (DE-599)DNB1029408157 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-634 |a DE-739 |a DE-11 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Trustworthy computing and services |b International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers |c Yuyu Yuan ... (eds.) |
264 | 1 | |a Heidelberg, Dordrecht, London, New York |b Springer |c [2013] | |
264 | 4 | |c © 2013 | |
300 | |a 1 Online-Ressource (XVII, 739 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Communications in computer and information science |v 320 | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Peking |2 gnd-content | |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 1 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Yuan, Yuyu |4 edt | |
711 | 2 | |a ISCTCS |n 2 |d 2012 |c Peking |j Sonstige |0 (DE-588)1032256893 |4 oth | |
830 | 0 | |a Communications in computer and information science |v 320 |w (DE-604)BV041227480 |9 320 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-35795-4 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025876851&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025876851&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-025876851 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-642-35795-4 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35795-4 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35795-4 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35795-4 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35795-4 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35795-4 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35795-4 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35795-4 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35795-4 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35795-4 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-35795-4 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804150181784977408 |
---|---|
adam_text | TRUSTWORTHY COMPUTING AND SERVICES
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
ARCHITECTURE FOR TRUSTED COMPUTING SYSTEMS
TRUSTED COMPUTING PLATFORM
TRUSTED SYSTEMS BUILD
NETWORK AND PROTOCOL SECURITY
MOBILE NETWORK SECURITY
NETWORK SURVIVABILITY AND OTHER CRITICAL THEORIES AND STANDARD SYSTEMS
CREDIBLE ASSESSMENT, CREDIBLE MEASUREMENT AND METRICS
TRUSTED SYSTEMS
TRUSTED NETWORKS
TRUSTED MOBILE NETWORK
TRUSTED ROUTING
TRUSTED SOFTWARE
TRUSTED OPERATING SYSTEMS
TRUSTED STORAGE
FAULT-TOLERANT COMPUTING AND OTHER KEY TECHNOLOGIES
TRUSTED E-COMMERCE AND E-GOVERNMENT
TRUSTED LOGISTICS
TRUSTED INTERNET OF THINGS
TRUSTED CLOUD AND OTHER TRUSTED SERVICES AND APPLICATIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
TRUSTWORTHY COMPUTING AND SERVICES
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE INTERNATIONAL
STANDARD CONFERENCE ON TRUSTWORTHY DISTRIBUTED COMPUTING AND SERVICES,
ISCTCS 2012, HELD IN BEIJING, CHINA, IN MAY/JUNE 2012. THE 92 REVISED
FULL PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM 278
PAPERS. THE TOPICS COVERED ARE ARCHITECTURE FOR TRUSTED COMPUTING
SYSTEMS, TRUSTED COMPUTING PLATFORM, TRUSTED SYSTEMS BUILD, NETWORK AND
PROTOCOL SECURITY, MOBILE NETWORK SECURITY, NETWORK SURVIVABILITY AND
OTHER CRITICAL THEORIES AND STANDARD SYSTEMS, CREDIBLE ASSESSMENT,
CREDIBLE MEASUREMENT AND METRICS, TRUSTED SYSTEMS, TRUSTED NETWORKS,
TRUSTED MOBILE NETWORK, TRUSTED ROUTING, TRUSTED SOFTWARE, TRUSTED
OPERATING SYSTEMS, TRUSTED STORAGE, FAULT-TOLERANT COMPUTING AND OTHER
KEY TECHNOLOGIES, TRUSTED E-COMMERCE AND E-GOVERNMENT, TRUSTED
LOGISTICS, TRUSTED INTERNET OF THINGS, TRUSTED CLOUD AND OTHER TRUSTED
SERVICES AND APPLICATIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Yuan, Yuyu |
author2_role | edt |
author2_variant | y y yy |
author_facet | Yuan, Yuyu |
building | Verbundindex |
bvnumber | BV040897309 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)829740315 (DE-599)DNB1029408157 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-35795-4 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03690nmm a2200697 cb4500</leader><controlfield tag="001">BV040897309</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220713 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130319s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,O02</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1029408157</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642357947</subfield><subfield code="9">978-3-642-35794-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642357954</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-35795-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-35795-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642357954</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)829740315</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1029408157</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trustworthy computing and services</subfield><subfield code="b">International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers</subfield><subfield code="c">Yuyu Yuan ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Heidelberg, Dordrecht, London, New York</subfield><subfield code="b">Springer</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 739 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in computer and information science</subfield><subfield code="v">320</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yuan, Yuyu</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISCTCS</subfield><subfield code="n">2</subfield><subfield code="d">2012</subfield><subfield code="c">Peking</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1032256893</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in computer and information science</subfield><subfield code="v">320</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">320</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025876851&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025876851&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025876851</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-35795-4</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Peking gnd-content |
genre_facet | Konferenzschrift 2012 Peking |
id | DE-604.BV040897309 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:34:51Z |
institution | BVB |
institution_GND | (DE-588)1032256893 |
isbn | 9783642357947 9783642357954 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025876851 |
oclc_num | 829740315 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-11 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-11 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVII, 739 Seiten) |
psigel | ZDB-2-SCS |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Communications in computer and information science |
series2 | Communications in computer and information science |
spelling | Trustworthy computing and services International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers Yuyu Yuan ... (eds.) Heidelberg, Dordrecht, London, New York Springer [2013] © 2013 1 Online-Ressource (XVII, 739 Seiten) txt rdacontent c rdamedia cr rdacarrier Communications in computer and information science 320 Datenschutz (DE-588)4011134-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Peking gnd-content Trusted Computing (DE-588)7562931-8 s DE-604 Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s 1\p DE-604 Yuan, Yuyu edt ISCTCS 2 2012 Peking Sonstige (DE-588)1032256893 oth Communications in computer and information science 320 (DE-604)BV041227480 320 https://doi.org/10.1007/978-3-642-35795-4 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025876851&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025876851&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Trustworthy computing and services International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers Communications in computer and information science Datenschutz (DE-588)4011134-9 gnd Trusted Computing (DE-588)7562931-8 gnd Informatik (DE-588)4026894-9 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)7562931-8 (DE-588)4026894-9 (DE-588)1071861417 |
title | Trustworthy computing and services International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers |
title_auth | Trustworthy computing and services International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers |
title_exact_search | Trustworthy computing and services International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers |
title_full | Trustworthy computing and services International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers Yuyu Yuan ... (eds.) |
title_fullStr | Trustworthy computing and services International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers Yuyu Yuan ... (eds.) |
title_full_unstemmed | Trustworthy computing and services International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers Yuyu Yuan ... (eds.) |
title_short | Trustworthy computing and services |
title_sort | trustworthy computing and services international conference isctcs 2012 beijing china may 28 june 2 2012 revised selected papers |
title_sub | International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012 ; revised selected papers |
topic | Datenschutz (DE-588)4011134-9 gnd Trusted Computing (DE-588)7562931-8 gnd Informatik (DE-588)4026894-9 gnd |
topic_facet | Datenschutz Trusted Computing Informatik Konferenzschrift 2012 Peking |
url | https://doi.org/10.1007/978-3-642-35795-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025876851&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025876851&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041227480 |
work_keys_str_mv | AT yuanyuyu trustworthycomputingandservicesinternationalconferenceisctcs2012beijingchinamay28june22012revisedselectedpapers AT isctcspeking trustworthycomputingandservicesinternationalconferenceisctcs2012beijingchinamay28june22012revisedselectedpapers |