Secure IT systems: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8208 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIII, 320S. graph. Darst. |
ISBN: | 3642414877 9783642414879 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041421135 | ||
003 | DE-604 | ||
005 | 20140224 | ||
007 | t| | ||
008 | 131118s2013 gw d||| |||| 10||| eng d | ||
015 | |a 13,N38 |2 dnb | ||
016 | 7 | |a 1041797915 |2 DE-101 | |
020 | |a 3642414877 |9 3-642-41487-7 | ||
020 | |a 9783642414879 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.) |9 978-3-642-41487-9 | ||
024 | 3 | |a 9783642414879 | |
028 | 5 | 2 | |a Best.-Nr.: 86327677 |
035 | |a (OCoLC)864499579 | ||
035 | |a (DE-599)DNB1041797915 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Secure IT systems |b 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings |c Hanne Riis Nielson ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a XIII, 320S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8208 | |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Computing |0 (DE-588)4694120-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web |0 (DE-588)4363898-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Ilulissat |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 4 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 2 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 4 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 1 | 5 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 1 | 6 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Nielson, Hanne Riis |d 1954- |e Sonstige |0 (DE-588)120458241 |4 oth | |
711 | 2 | |a NordSec |n 18 |d 2013 |c Ilulissat |j Sonstige |0 (DE-588)1044267100 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-41488-6 |
830 | 0 | |a Lecture notes in computer science |v 8208 |w (DE-604)BV000000607 |9 8208 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4443043&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026868209&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026868209 |
Datensatz im Suchindex
_version_ | 1820875531637227520 |
---|---|
adam_text |
TABLE OF CONTENTS
CYBER-PHYSICAL SYSTEMS
DETECTING AND PREVENTING BEACON REPLAY ATTACKS IN RECEIVER-INITIATED
MAC PROTOCOLS FOR ENERGY EFFICIENT WSNS 1
ALESSIO DI MAURO, XENOFON FAFOUTIS, SEBASTIAN MODERSHEIM, AND
NICOLA DRAGONI
SECURITY GAMES FOR CYBER-PHYSICAL SYSTEMS 17
B.OBERTO VIGO, ALESSANDRO BRUNI, AND ENDER YIIKSEL
PREVENT SESSION HIJACKING BY BINDING THE SESSION TO THE CRYPTOGRAPHIC
NETWORK CREDENTIALS 33
WILLEM BURGERS, R.OEL VERDULT, AND MARKO VAN EEKELEN
SECURITY POLICIES
INFERRING REQUIRED PERMISSIONS FOR STATICALLY COMPOSED PROGRAMS 51
TERO HASU, ANY A HELENE BAGGE, AND MAGNE HAVERAAEN
SAFESCRIPT
:
JAVASCRIPT TRANSFORMATION FOR POLICY ENFORCEMENT
67
MIKE TER LOUW, PHU H. PHUNG, B.OHINI KRISHNAMURTI, AND
VENKAT N. VENKATAKRISHNAN
INFORMATION FLOW
A LOGIC FOR INFORMATION FLOW ANALYSIS OF DISTRIBUTED PROGRAMS 84
MUSARD BALLIU
DYNAMICS AND SECURE INFORMATION FLOW FOR A HIGHER-ORDER
PI-CALCULUS 100
MARTIN PETTAI AND PEETER LAUD
LAZY PROGRAMS LEAK SECRETS 116
PABLO BUIRAS AND ALEJANDRO R.USSO
SECURITY EXPERIENCES
HIGH-PERFORMANCE QUALIFIED DIGITAL SIGNATURES FOR X-R,OAD 123
ARNE ANSPER, AHTO BULDAS, MARGUS PREUDENTHAL, AND JAN WILLEMSON
HTTP://D-NB.INFO/1041797915
XII
TABLE OF CONTENTS
IDENTIFICATION AND EVALUATION OF SECURITY ACTIVITIES IN AGILE
PROJECTS. 139
TIGIST AYALEW, TIGIST KIDANE, AND BENGT CARLSSON
PEER SHARE:
A SYSTEM SECURE DISTRIBUTION OF SENSITIVE DATA AMONG
SOCIAL CONTACTS 154
MARCIN NAGY, N. ASOKAN, AND JORG OTT
CYBER-PHYSICAL SYSTEMS
RESILIENCE OF PROCESS CONTROL SYSTEMS TO CYBER-PHYSICAL ATTACKS 166
MARINA KROTOFIL AND ALVARO A. CARDENAS
FEMTOCELL SECURITY IN THEORY AND PRACTICE 183
FABIAN VAN DEN BROEK AND R.ONNY WICHERS SCHREUR
SECURITY ANALYSIS OF BUILDING AUTOMATION NETWORKS: THREAT MODEL AND
VIABLE MITIGATION TECHNIQUES 199
ALESSIO ANTONINI, ALESSANDRO BARENGHI, AND GERARDO PELOSI
WEB SECURITY
CONTROLLING DATA FLOW WITH A POLICY-BASED PROGRAMMING LANGUAGE FOR
THE WEB 215
THIERRY SANS, ILIANO CERVESATO, AND SOHA HUSSEIN
A SURVEY ON CONTROL-FLOW INTEGRITY MEANS IN WEB APPLICATION
FRAMEWORKS 231
BASTIAN BRAUN, CHRISTIAN V. POLLAK, AND JOACHIM POSEGGA
SECURITY POLICIES
INCREMENTAL HYPERPROPERTY MODEL CHECKING VIA GAMES 247
DIMITER MILUSHEV AND DAVE CLARKE
GRAPH K-ANONYMITY THROUGH K-MEANS AND AS MODULAR
DECOMPOSITION 263
KLARA STOKES
NETWORK SECURITY
DOMAIN-BASED STORAGE PROTECTION (DBSP) IN PUBLIC INFRASTRUCTURE
CLOUDS 279
NICOLAE PALADI, CHRISTIAN GEHRMANN, AND PREDRIC MORENIUS
TABLE OF CONTENTS XIII
AN ADAPTIVE MITIGATION FRAMEWORK FOR HANDLING SUSPICIOUS NETWORK
FLOWS VIA MPLS POLICIES 297
NABIL HACHEM, JOAQUIN GARCIA-ALFARO, AND HERVE DEBAR
KEYLESS SIGNATURES' INFRASTRUCTURE: HOW TO BUILD GLOBAL DISTRIBUTED
HASH-TREES 313
AHTO BULDAS, ANDRES KROONMAA, AND R.ISTO LAANOJA
AUTHOR INDEX 321 |
any_adam_object | 1 |
author_GND | (DE-588)120458241 |
building | Verbundindex |
bvnumber | BV041421135 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 050f |
ctrlnum | (OCoLC)864499579 (DE-599)DNB1041797915 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041421135</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140224</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">131118s2013 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,N38</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1041797915</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642414877</subfield><subfield code="9">3-642-41487-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642414879</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-41487-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642414879</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86327677</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864499579</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1041797915</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure IT systems</subfield><subfield code="b">18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings</subfield><subfield code="c">Hanne Riis Nielson ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 320S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8208</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Ilulissat</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="6"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nielson, Hanne Riis</subfield><subfield code="d">1954-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)120458241</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">NordSec</subfield><subfield code="n">18</subfield><subfield code="d">2013</subfield><subfield code="c">Ilulissat</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1044267100</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-41488-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8208</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">8208</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4443043&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026868209&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026868209</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Ilulissat gnd-content |
genre_facet | Konferenzschrift 2013 Ilulissat |
id | DE-604.BV041421135 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:05Z |
institution | BVB |
institution_GND | (DE-588)1044267100 |
isbn | 3642414877 9783642414879 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026868209 |
oclc_num | 864499579 |
open_access_boolean | |
owner | DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-83 DE-11 DE-91G DE-BY-TUM |
physical | XIII, 320S. graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings Hanne Riis Nielson ... (eds.) Berlin [u.a.] Springer 2013 XIII, 320S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 8208 Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kritische Infrastruktur (DE-588)7636249-8 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Mobile Computing (DE-588)4694120-4 gnd rswk-swf World Wide Web (DE-588)4363898-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Ilulissat gnd-content Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kryptoanalyse (DE-588)4830502-9 s Privatsphäre (DE-588)4123980-5 s Kritische Infrastruktur (DE-588)7636249-8 s DE-604 World Wide Web (DE-588)4363898-3 s Mobile Computing (DE-588)4694120-4 s Kritische Informationsinfrastruktur (DE-588)7636254-1 s 1\p DE-604 Nielson, Hanne Riis 1954- Sonstige (DE-588)120458241 oth NordSec 18 2013 Ilulissat Sonstige (DE-588)1044267100 oth Erscheint auch als Online-Ausgabe 978-3-642-41488-6 Lecture notes in computer science 8208 (DE-604)BV000000607 8208 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4443043&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026868209&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings Lecture notes in computer science Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Kritische Infrastruktur (DE-588)7636249-8 gnd Privatsphäre (DE-588)4123980-5 gnd Mobile Computing (DE-588)4694120-4 gnd World Wide Web (DE-588)4363898-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7636254-1 (DE-588)4011144-1 (DE-588)7636249-8 (DE-588)4123980-5 (DE-588)4694120-4 (DE-588)4363898-3 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)1071861417 |
title | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings |
title_auth | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings |
title_exact_search | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings |
title_full | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings Hanne Riis Nielson ... (eds.) |
title_fullStr | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings Hanne Riis Nielson ... (eds.) |
title_full_unstemmed | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings Hanne Riis Nielson ... (eds.) |
title_short | Secure IT systems |
title_sort | secure it systems 18th nordic conference nordsec 2013 ilulissat greenland october 18 21 2013 proceedings |
title_sub | 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings |
topic | Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Kritische Infrastruktur (DE-588)7636249-8 gnd Privatsphäre (DE-588)4123980-5 gnd Mobile Computing (DE-588)4694120-4 gnd World Wide Web (DE-588)4363898-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kritische Informationsinfrastruktur Datensicherung Kritische Infrastruktur Privatsphäre Mobile Computing World Wide Web Kryptoanalyse Computersicherheit Konferenzschrift 2013 Ilulissat |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4443043&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026868209&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT nielsonhanneriis secureitsystems18thnordicconferencenordsec2013ilulissatgreenlandoctober18212013proceedings AT nordsecilulissat secureitsystems18thnordicconferencenordsec2013ilulissatgreenlandoctober18212013proceedings |