Trustworthy computing and services: International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer
[2014]
|
Schriftenreihe: | Communications in computer and information science
426 |
Schlagworte: | |
Online-Zugang: | DE-522 DE-634 DE-Aug4 DE-M347 DE-92 DE-859 DE-861 DE-473 DE-355 DE-703 DE-20 DE-29 DE-739 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIV, 408 Seiten) Illustrationen, Diagramme (überwiegend farbig) |
ISBN: | 9783662439081 |
DOI: | 10.1007/978-3-662-43908-1 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041992394 | ||
003 | DE-604 | ||
005 | 20220711 | ||
007 | cr|uuu---uuuuu | ||
008 | 140724s2014 xx a||| o|||| 10||| eng d | ||
020 | |a 9783662439081 |c Online |9 978-3-662-43908-1 | ||
024 | 7 | |a 10.1007/978-3-662-43908-1 |2 doi | |
035 | |a (OCoLC)882518013 | ||
035 | |a (DE-599)BVBBV041992394 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-20 |a DE-92 |a DE-859 |a DE-M347 |a DE-473 |a DE-522 |a DE-861 |a DE-Aug4 |a DE-29 |a DE-634 |a DE-739 |a DE-11 |a DE-355 | ||
082 | 0 | |a 004 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Yuan, Yuyu |e Verfasser |4 aut | |
245 | 1 | 0 | |a Trustworthy computing and services |b International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers |c Yuyu Yuan, Xu Wu, Yueming Lu (eds.) |
264 | 1 | |a Berlin, Heidelberg |b Springer |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 Online-Ressource (XIV, 408 Seiten) |b Illustrationen, Diagramme (überwiegend farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Communications in computer and information science |v 426 | |
533 | |a Online-Ausgabe |f Springer eBook Collection / Computer Science | ||
534 | |c 2014 | ||
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Peking |2 gnd-content | |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Wu, Xu |e Sonstige |0 (DE-588)1014444330 |4 oth | |
700 | 1 | |a Lu, Yueming |e Sonstige |4 oth | |
776 | 0 | 8 | |i Reproduktion von |a Yuan, Yuyu |t Trustworthy Computing and Services |d 2014 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-662-43907-4 |
830 | 0 | |a Communications in computer and information science |v 426 |w (DE-604)BV041227480 |9 426 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-43908-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027434598&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027434598&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-SCS | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027434598 | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-522 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43908-1 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1820882471078592512 |
---|---|
adam_text |
TRUSTWORTHY COMPUTING AND SERVICES
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
TRUSTWORTHY INFRASTRUCTURE
SECURITY, SURVIVABILITY AND FAULT TOLERANCE
STANDARDS, EVALUATION AND CERTIFICATION
TRUSTWORTHINESS OF SERVICES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
TRUSTWORTHY COMPUTING AND SERVICES
/
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE INTERNATIONAL
STANDARD CONFERENCE ON TRUSTWORTHY DISTRIBUTED COMPUTING AND SERVICES,
ISCTCS 2013, HELD IN BEIJING, CHINA, IN NOVEMBER 2013. THE 49 REVISED
FULL PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM 267
PAPERS. THE TOPICS COVERED ARE TRUSTWORTHY INFRASTRUCTURE; SECURITY,
SURVIVABILITY AND FAULT TOLERANCE; STANDARDS, EVALUATION AND
CERTIFICATION; TRUSTWORTHINESS OF SERVICES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author | Yuan, Yuyu |
author_GND | (DE-588)1014444330 |
author_facet | Yuan, Yuyu |
author_role | aut |
author_sort | Yuan, Yuyu |
author_variant | y y yy |
building | Verbundindex |
bvnumber | BV041992394 |
classification_rvk | ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)882518013 (DE-599)BVBBV041992394 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-43908-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041992394</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220711</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140724s2014 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662439081</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-43908-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-43908-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)882518013</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041992394</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yuan, Yuyu</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trustworthy computing and services</subfield><subfield code="b">International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers</subfield><subfield code="c">Yuyu Yuan, Xu Wu, Yueming Lu (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 408 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme (überwiegend farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in computer and information science</subfield><subfield code="v">426</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="f">Springer eBook Collection / Computer Science</subfield></datafield><datafield tag="534" ind1=" " ind2=" "><subfield code="c">2014</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wu, Xu</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1014444330</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lu, Yueming</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="a">Yuan, Yuyu</subfield><subfield code="t">Trustworthy Computing and Services</subfield><subfield code="d">2014</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-662-43907-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in computer and information science</subfield><subfield code="v">426</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">426</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027434598&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027434598&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027434598</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43908-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Peking gnd-content |
genre_facet | Konferenzschrift 2013 Peking |
id | DE-604.BV041992394 |
illustrated | Illustrated |
indexdate | 2025-01-10T17:07:24Z |
institution | BVB |
isbn | 9783662439081 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027434598 |
oclc_num | 882518013 |
open_access_boolean | |
owner | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-11 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-11 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIV, 408 Seiten) Illustrationen, Diagramme (überwiegend farbig) |
psigel | ZDB-2-SCS |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Communications in computer and information science |
series2 | Communications in computer and information science |
spelling | Yuan, Yuyu Verfasser aut Trustworthy computing and services International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers Yuyu Yuan, Xu Wu, Yueming Lu (eds.) Berlin, Heidelberg Springer [2014] © 2014 1 Online-Ressource (XIV, 408 Seiten) Illustrationen, Diagramme (überwiegend farbig) txt rdacontent c rdamedia cr rdacarrier Communications in computer and information science 426 Online-Ausgabe Springer eBook Collection / Computer Science 2014 Datenschutz (DE-588)4011134-9 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Peking gnd-content Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s DE-604 Trusted Computing (DE-588)7562931-8 s 1\p DE-604 Wu, Xu Sonstige (DE-588)1014444330 oth Lu, Yueming Sonstige oth Reproduktion von Yuan, Yuyu Trustworthy Computing and Services 2014 Erscheint auch als Druckausgabe 978-3-662-43907-4 Communications in computer and information science 426 (DE-604)BV041227480 426 https://doi.org/10.1007/978-3-662-43908-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027434598&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027434598&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Yuan, Yuyu Trustworthy computing and services International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers Communications in computer and information science Datenschutz (DE-588)4011134-9 gnd Informatik (DE-588)4026894-9 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4026894-9 (DE-588)7562931-8 (DE-588)1071861417 |
title | Trustworthy computing and services International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers |
title_auth | Trustworthy computing and services International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers |
title_exact_search | Trustworthy computing and services International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers |
title_full | Trustworthy computing and services International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers Yuyu Yuan, Xu Wu, Yueming Lu (eds.) |
title_fullStr | Trustworthy computing and services International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers Yuyu Yuan, Xu Wu, Yueming Lu (eds.) |
title_full_unstemmed | Trustworthy computing and services International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers Yuyu Yuan, Xu Wu, Yueming Lu (eds.) |
title_short | Trustworthy computing and services |
title_sort | trustworthy computing and services international conference isctcs 2013 beijing china november 2013 revised selected papers |
title_sub | International conference, ISCTCS 2013, Beijing, China, November 2013, revised selected papers |
topic | Datenschutz (DE-588)4011134-9 gnd Informatik (DE-588)4026894-9 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Datenschutz Informatik Trusted Computing Konferenzschrift 2013 Peking |
url | https://doi.org/10.1007/978-3-662-43908-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027434598&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027434598&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041227480 |
work_keys_str_mv | AT yuanyuyu trustworthycomputingandservicesinternationalconferenceisctcs2013beijingchinanovember2013revisedselectedpapers AT wuxu trustworthycomputingandservicesinternationalconferenceisctcs2013beijingchinanovember2013revisedselectedpapers AT luyueming trustworthycomputingandservicesinternationalconferenceisctcs2013beijingchinanovember2013revisedselectedpapers |