Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
8924 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XI, 275 p. 70 illus) |
ISBN: | 9783319171272 9783319171265 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-17127-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042544535 | ||
003 | DE-604 | ||
005 | 20150513 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150506s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319171272 |c Online |9 978-3-319-17127-2 | ||
020 | |a 9783319171265 |c Print |9 978-3-319-17126-5 | ||
024 | 7 | |a 10.1007/978-3-319-17127-2 |2 doi | |
035 | |a (OCoLC)908701173 | ||
035 | |a (DE-599)BVBBV042544535 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Risks and Security of Internet and Systems |b 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers |c edited by Javier Lopez, Indrajit Ray, Bruno Crispo |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (XI, 275 p. 70 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 8924 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Information Systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a López, Javier |e Sonstige |0 (DE-588)1038539560 |4 oth | |
711 | 2 | |a CRiSIS |n 9. |d 2014 |c Trient |j Sonstige |0 (DE-588)1070923249 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 8924 |w (DE-604)BV014880109 |9 8924 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-17127-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978541&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978541&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027978541 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804153310183161856 |
---|---|
adam_text | RISKS AND SECURITY OF INTERNET AND SYSTEMS
/ LOPEZ, JAVIER
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
TRUST
SECURITY RISKS AND THREATS
INTRUSION DETECTION AND PREVENTION
ACCESS CONTROL AND SECURITY MODELING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
RISKS AND SECURITY OF INTERNET AND SYSTEMS
/ LOPEZ, JAVIER
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST- CONFERENCE
PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON RISKS AND SECURITY
OF INTERNET SYSTEMS, CRISIS 2014, HELD IN TRENTO, ITALY, IN AUGUST 2014.
THE 13 FULL PAPERS AND 6 SHORT PAPERS PRESENTED WERE SELECTED FROM 48
SUBMISSIONS. THEY EXPLORE RISKS AND SECURITY ISSUES IN INTERNET
APPLICATIONS, NETWORKS AND SYSTEMS COVERING TOPICS SUCH AS TRUST,
SECURITY RISKS AND THREATS, INTRUSION DETECTION AND PREVENTION, ACCESS
CONTROL AND SECURITY MODELING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author_GND | (DE-588)1038539560 |
building | Verbundindex |
bvnumber | BV042544535 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)908701173 (DE-599)BVBBV042544535 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-17127-2 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03087nmm a2200661zcb4500</leader><controlfield tag="001">BV042544535</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150513 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150506s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319171272</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-17127-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319171265</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-17126-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-17127-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908701173</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042544535</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Risks and Security of Internet and Systems</subfield><subfield code="b">9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers</subfield><subfield code="c">edited by Javier Lopez, Indrajit Ray, Bruno Crispo</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 275 p. 70 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8924</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">López, Javier</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1038539560</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CRiSIS</subfield><subfield code="n">9.</subfield><subfield code="d">2014</subfield><subfield code="c">Trient</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1070923249</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8924</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8924</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-17127-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978541&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978541&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027978541</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV042544535 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:24:34Z |
institution | BVB |
institution_GND | (DE-588)1070923249 |
isbn | 9783319171272 9783319171265 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027978541 |
oclc_num | 908701173 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XI, 275 p. 70 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers edited by Javier Lopez, Indrajit Ray, Bruno Crispo Cham Springer International Publishing 2015 1 Online-Ressource (XI, 275 p. 70 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 8924 0302-9743 Computer science Computer Communication Networks Software engineering Data protection Data encryption (Computer science) Information Systems Computer Science Systems and Data Security Management of Computing and Information Systems Software Engineering Information Systems Applications (incl. Internet) Data Encryption Informatik Sicherheit (DE-588)4054790-5 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Internet (DE-588)4308416-3 s Sicherheit (DE-588)4054790-5 s 1\p DE-604 López, Javier Sonstige (DE-588)1038539560 oth CRiSIS 9. 2014 Trient Sonstige (DE-588)1070923249 oth Lecture Notes in Computer Science 8924 (DE-604)BV014880109 8924 https://doi.org/10.1007/978-3-319-17127-2 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978541&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978541&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers Lecture Notes in Computer Science Computer science Computer Communication Networks Software engineering Data protection Data encryption (Computer science) Information Systems Computer Science Systems and Data Security Management of Computing and Information Systems Software Engineering Information Systems Applications (incl. Internet) Data Encryption Informatik Sicherheit (DE-588)4054790-5 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4054790-5 (DE-588)4308416-3 (DE-588)1071861417 |
title | Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers |
title_auth | Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers |
title_exact_search | Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers |
title_full | Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers edited by Javier Lopez, Indrajit Ray, Bruno Crispo |
title_fullStr | Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers edited by Javier Lopez, Indrajit Ray, Bruno Crispo |
title_full_unstemmed | Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers edited by Javier Lopez, Indrajit Ray, Bruno Crispo |
title_short | Risks and Security of Internet and Systems |
title_sort | risks and security of internet and systems 9th international conference crisis 2014 trento italy august 27 29 2014 revised selected papers |
title_sub | 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers |
topic | Computer science Computer Communication Networks Software engineering Data protection Data encryption (Computer science) Information Systems Computer Science Systems and Data Security Management of Computing and Information Systems Software Engineering Information Systems Applications (incl. Internet) Data Encryption Informatik Sicherheit (DE-588)4054790-5 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Computer science Computer Communication Networks Software engineering Data protection Data encryption (Computer science) Information Systems Computer Science Systems and Data Security Management of Computing and Information Systems Software Engineering Information Systems Applications (incl. Internet) Data Encryption Informatik Sicherheit Internet Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-17127-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978541&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978541&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT lopezjavier risksandsecurityofinternetandsystems9thinternationalconferencecrisis2014trentoitalyaugust27292014revisedselectedpapers AT crisistrient risksandsecurityofinternetandsystems9thinternationalconferencecrisis2014trentoitalyaugust27292014revisedselectedpapers |