Engineering Secure Software and Systems: 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
8978 |
Schlagworte: | |
Online-Zugang: | Volltext Abstract Inhaltsverzeichnis |
Beschreibung: | 1 Online-Ressource (XII, 227 p.) Ill. |
ISBN: | 9783319156187 9783319156170 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-15618-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042387218 | ||
003 | DE-604 | ||
005 | 20180131 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150303s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319156187 |c Online |9 978-3-319-15618-7 | ||
020 | |a 9783319156170 |c Print |9 978-3-319-15617-0 | ||
024 | 7 | |a 10.1007/978-3-319-15618-7 |2 doi | |
035 | |a (OCoLC)904326728 | ||
035 | |a (DE-599)BVBBV042387218 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-29 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 004.6 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 310f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Engineering Secure Software and Systems |b 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings |c edited by Frank Piessens, Juan Caballero, Nataliia Bielova |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (XII, 227 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 8978 |x 0302-9743 | |
650 | 0 | 7 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Requirements engineering |0 (DE-588)4213997-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Autorisierung |0 (DE-588)4638999-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software Engineering |0 (DE-588)4116521-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarearchitektur |0 (DE-588)4121677-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Modellgetriebene Entwicklung |0 (DE-588)4832365-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Mailand |2 gnd-content | |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Software Engineering |0 (DE-588)4116521-4 |D s |
689 | 0 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 3 | |a Softwarearchitektur |0 (DE-588)4121677-5 |D s |
689 | 0 | 4 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Requirements engineering |0 (DE-588)4213997-1 |D s |
689 | 1 | 1 | |a Softwarearchitektur |0 (DE-588)4121677-5 |D s |
689 | 1 | 2 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |D s |
689 | 1 | 3 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 1 | 4 | |a Autorisierung |0 (DE-588)4638999-4 |D s |
689 | 1 | 5 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 6 | |a Modellgetriebene Entwicklung |0 (DE-588)4832365-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | 2 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 2 | 3 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
700 | 1 | |a Piessens, Frank |e Sonstige |0 (DE-588)1067217126 |4 oth | |
711 | 2 | |a ESSOS |n 7. |d 2015 |c Mailand |j Sonstige |0 (DE-588)1067215816 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 8978 |w (DE-604)BV014880109 |9 8978 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-15618-7 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027823178&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027823178&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027823178 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804153033739730944 |
---|---|
adam_text | ENGINEERING SECURE SOFTWARE AND SYSTEMS
/ PIESSENS, FRANK
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 7TH INTERNATIONAL
SYMPOSIUM ON ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2015, HELD
IN MILAN, ITALY, IN MARCH 2015. THE 11 FULL PAPERS PRESENTED TOGETHER
WITH 5 SHORT PAPERS WERE CAREFULLY REVIEWED AND SELECTED FROM 41
SUBMISSIONS. THE SYMPOSIUM FEATURES THE FOLLOWING TOPICS: FORMAL
METHODS; CLOUD PASSWORDS; MACHINE LEARNING; MEASUREMENTS ONTOLOGIES; AND
ACCESS CONTROL
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
ENGINEERING SECURE SOFTWARE AND SYSTEMS
/ PIESSENS, FRANK
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
FORMAL METHODS
CLOUD PASSWORDS
MACHINE LEARNING
MEASUREMENTS ONTOLOGIES
ACCESS CONTROL
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author_GND | (DE-588)1067217126 |
building | Verbundindex |
bvnumber | BV042387218 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f DAT 461f DAT 310f DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)904326728 (DE-599)BVBBV042387218 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-15618-7 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04497nmm a2200901zcb4500</leader><controlfield tag="001">BV042387218</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180131 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150303s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319156187</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-15618-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319156170</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-15617-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-15618-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)904326728</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042387218</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 310f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering Secure Software and Systems</subfield><subfield code="b">7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings</subfield><subfield code="c">edited by Frank Piessens, Juan Caballero, Nataliia Bielova</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 227 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8978</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Autorisierung</subfield><subfield code="0">(DE-588)4638999-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Modellgetriebene Entwicklung</subfield><subfield code="0">(DE-588)4832365-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Mailand</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Autorisierung</subfield><subfield code="0">(DE-588)4638999-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="6"><subfield code="a">Modellgetriebene Entwicklung</subfield><subfield code="0">(DE-588)4832365-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Piessens, Frank</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1067217126</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ESSOS</subfield><subfield code="n">7.</subfield><subfield code="d">2015</subfield><subfield code="c">Mailand</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1067215816</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8978</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8978</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-15618-7</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027823178&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027823178&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027823178</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Mailand gnd-content |
genre_facet | Konferenzschrift 2015 Mailand |
id | DE-604.BV042387218 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:20:11Z |
institution | BVB |
institution_GND | (DE-588)1067215816 |
isbn | 9783319156187 9783319156170 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027823178 |
oclc_num | 904326728 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-706 DE-20 DE-739 DE-92 DE-29 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-706 DE-20 DE-739 DE-92 DE-29 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XII, 227 p.) Ill. |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings edited by Frank Piessens, Juan Caballero, Nataliia Bielova Cham Springer International Publishing 2015 1 Online-Ressource (XII, 227 p.) Ill. txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 8978 0302-9743 Serviceorientierte Architektur (DE-588)4841015-9 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Requirements engineering (DE-588)4213997-1 gnd rswk-swf Autorisierung (DE-588)4638999-4 gnd rswk-swf Software Engineering (DE-588)4116521-4 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf Softwarearchitektur (DE-588)4121677-5 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Modellgetriebene Entwicklung (DE-588)4832365-2 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2015 Mailand gnd-content Informatik (DE-588)4026894-9 s Software Engineering (DE-588)4116521-4 s Chiffrierung (DE-588)4352893-4 s Softwarearchitektur (DE-588)4121677-5 s Anwendungssystem (DE-588)4139375-2 s DE-604 Requirements engineering (DE-588)4213997-1 s Serviceorientierte Architektur (DE-588)4841015-9 s Softwareschwachstelle (DE-588)4752508-3 s Autorisierung (DE-588)4638999-4 s Kryptoanalyse (DE-588)4830502-9 s Modellgetriebene Entwicklung (DE-588)4832365-2 s 1\p DE-604 Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Softwareentwicklung (DE-588)4116522-6 s 2\p DE-604 Piessens, Frank Sonstige (DE-588)1067217126 oth ESSOS 7. 2015 Mailand Sonstige (DE-588)1067215816 oth Lecture Notes in Computer Science 8978 (DE-604)BV014880109 8978 https://doi.org/10.1007/978-3-319-15618-7 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027823178&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027823178&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings Lecture Notes in Computer Science Serviceorientierte Architektur (DE-588)4841015-9 gnd Chiffrierung (DE-588)4352893-4 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Informatik (DE-588)4026894-9 gnd Requirements engineering (DE-588)4213997-1 gnd Autorisierung (DE-588)4638999-4 gnd Software Engineering (DE-588)4116521-4 gnd Anwendungssystem (DE-588)4139375-2 gnd Softwarearchitektur (DE-588)4121677-5 gnd Softwareentwicklung (DE-588)4116522-6 gnd Computersicherheit (DE-588)4274324-2 gnd Modellgetriebene Entwicklung (DE-588)4832365-2 gnd Softwareschwachstelle (DE-588)4752508-3 gnd |
subject_GND | (DE-588)4841015-9 (DE-588)4352893-4 (DE-588)4011144-1 (DE-588)4830502-9 (DE-588)4026894-9 (DE-588)4213997-1 (DE-588)4638999-4 (DE-588)4116521-4 (DE-588)4139375-2 (DE-588)4121677-5 (DE-588)4116522-6 (DE-588)4274324-2 (DE-588)4832365-2 (DE-588)4752508-3 (DE-588)1071861417 |
title | Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings |
title_auth | Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings |
title_exact_search | Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings |
title_full | Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings edited by Frank Piessens, Juan Caballero, Nataliia Bielova |
title_fullStr | Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings edited by Frank Piessens, Juan Caballero, Nataliia Bielova |
title_full_unstemmed | Engineering Secure Software and Systems 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings edited by Frank Piessens, Juan Caballero, Nataliia Bielova |
title_short | Engineering Secure Software and Systems |
title_sort | engineering secure software and systems 7th international symposium essos 2015 milan italy march 4 6 2015 proceedings |
title_sub | 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings |
topic | Serviceorientierte Architektur (DE-588)4841015-9 gnd Chiffrierung (DE-588)4352893-4 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Informatik (DE-588)4026894-9 gnd Requirements engineering (DE-588)4213997-1 gnd Autorisierung (DE-588)4638999-4 gnd Software Engineering (DE-588)4116521-4 gnd Anwendungssystem (DE-588)4139375-2 gnd Softwarearchitektur (DE-588)4121677-5 gnd Softwareentwicklung (DE-588)4116522-6 gnd Computersicherheit (DE-588)4274324-2 gnd Modellgetriebene Entwicklung (DE-588)4832365-2 gnd Softwareschwachstelle (DE-588)4752508-3 gnd |
topic_facet | Serviceorientierte Architektur Chiffrierung Datensicherung Kryptoanalyse Informatik Requirements engineering Autorisierung Software Engineering Anwendungssystem Softwarearchitektur Softwareentwicklung Computersicherheit Modellgetriebene Entwicklung Softwareschwachstelle Konferenzschrift 2015 Mailand |
url | https://doi.org/10.1007/978-3-319-15618-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027823178&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027823178&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT piessensfrank engineeringsecuresoftwareandsystems7thinternationalsymposiumessos2015milanitalymarch462015proceedings AT essosmailand engineeringsecuresoftwareandsystems7thinternationalsymposiumessos2015milanitalymarch462015proceedings |