Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer
2015
|
Ausgabe: | 1st ed. 2015 |
Schriftenreihe: | Lecture Notes in Computer Science
9229 |
Schlagworte: | |
Online-Zugang: | Volltext Abstract |
Beschreibung: | 1 Online-Ressource (XI, 328 p. 79 illus) |
ISBN: | 9783319228464 9783319228457 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-22846-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042788352 | ||
003 | DE-604 | ||
005 | 20170419 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150901s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319228464 |c Online |9 978-3-319-22846-4 | ||
020 | |a 9783319228457 |c Print |9 978-3-319-22845-7 | ||
024 | 7 | |a 10.1007/978-3-319-22846-4 |2 doi | |
035 | |a (OCoLC)920801272 | ||
035 | |a (DE-599)BVBBV042788352 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Trust and Trustworthy Computing |b 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings |c edited by Mauro Conti, Matthias Schunter, Ioannis Askoxylakis |
250 | |a 1st ed. 2015 | ||
264 | 1 | |a Cham |b Springer |c 2015 | |
300 | |a 1 Online-Ressource (XI, 328 p. 79 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9229 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Information systems | |
650 | 4 | |a Information Systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Information Systems and Communication Service | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 24.08.2015-06,08,2015 |z Heraklion |2 gnd-content | |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Conti, Mauro |e Sonstige |4 oth | |
711 | 2 | |a TRUST |n 8. |d 2015 |c Heraklion |j Sonstige |0 (DE-588)1075871247 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9229 |w (DE-604)BV014880109 |9 9229 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-22846-4 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218229&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028218229 |
Datensatz im Suchindex
_version_ | 1804175020999573504 |
---|---|
adam_text | TRUST AND TRUSTWORTHY COMPUTING
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 8TH INTERNATIONAL
CONFERENCE ON TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, HELD IN
HERAKLION, CRETE, GREECE, IN AUGUST 2015. THE 15 FULL PAPERS AND 3 SHORT
PAPERS PRESENTED IN THIS VOLUME WERE CAREFULLY REVIEWED AND SELECTED
FROM 42 SUBMISSIONS. THEY WERE ORGANIZED IN TOPICAL SECTIONS NAMED:
HARDWARE-ENHANCED TRUSTED EXECUTION; TRUST AND USERS; TRUSTED SYSTEMS
AND SERVICES; TRUST AND PRIVACY; AND BUILDING BLOCKS FOR TRUST. THERE
ARE 7 TWO-PAGE ABSTRACTS OF POSTER PAPERS INCLUDED IN THE BACK MATTER OF
THE VOLUME
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV042788352 |
classification_tum | DAT 050f DAT 460f DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)920801272 (DE-599)BVBBV042788352 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-22846-4 |
edition | 1st ed. 2015 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02667nmm a2200637zcb4500</leader><controlfield tag="001">BV042788352</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170419 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150901s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319228464</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-22846-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319228457</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-22845-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-22846-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)920801272</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042788352</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trust and Trustworthy Computing</subfield><subfield code="b">8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings</subfield><subfield code="c">edited by Mauro Conti, Matthias Schunter, Ioannis Askoxylakis</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 328 p. 79 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9229</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">24.08.2015-06,08,2015</subfield><subfield code="z">Heraklion</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Conti, Mauro</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">TRUST</subfield><subfield code="n">8.</subfield><subfield code="d">2015</subfield><subfield code="c">Heraklion</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1075871247</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9229</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9229</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-22846-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218229&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028218229</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 24.08.2015-06,08,2015 Heraklion gnd-content |
genre_facet | Konferenzschrift 24.08.2015-06,08,2015 Heraklion |
id | DE-604.BV042788352 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:09:39Z |
institution | BVB |
institution_GND | (DE-588)1075871247 |
isbn | 9783319228464 9783319228457 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028218229 |
oclc_num | 920801272 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XI, 328 p. 79 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings edited by Mauro Conti, Matthias Schunter, Ioannis Askoxylakis 1st ed. 2015 Cham Springer 2015 1 Online-Ressource (XI, 328 p. 79 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9229 0302-9743 Computer science Data protection Data encryption (Computer science) Information systems Information Systems Computer Science Systems and Data Security Management of Computing and Information Systems Data Encryption Computers and Society Information Systems and Communication Service Informatik Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 24.08.2015-06,08,2015 Heraklion gnd-content Trusted Computing (DE-588)7562931-8 s DE-604 Conti, Mauro Sonstige oth TRUST 8. 2015 Heraklion Sonstige (DE-588)1075871247 oth Lecture Notes in Computer Science 9229 (DE-604)BV014880109 9229 https://doi.org/10.1007/978-3-319-22846-4 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218229&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings Lecture Notes in Computer Science Computer science Data protection Data encryption (Computer science) Information systems Information Systems Computer Science Systems and Data Security Management of Computing and Information Systems Data Encryption Computers and Society Information Systems and Communication Service Informatik Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)7562931-8 (DE-588)1071861417 |
title | Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings |
title_auth | Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings |
title_exact_search | Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings |
title_full | Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings edited by Mauro Conti, Matthias Schunter, Ioannis Askoxylakis |
title_fullStr | Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings edited by Mauro Conti, Matthias Schunter, Ioannis Askoxylakis |
title_full_unstemmed | Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings edited by Mauro Conti, Matthias Schunter, Ioannis Askoxylakis |
title_short | Trust and Trustworthy Computing |
title_sort | trust and trustworthy computing 8th international conference trust 2015 heraklion greece august 24 26 2015 proceedings |
title_sub | 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings |
topic | Computer science Data protection Data encryption (Computer science) Information systems Information Systems Computer Science Systems and Data Security Management of Computing and Information Systems Data Encryption Computers and Society Information Systems and Communication Service Informatik Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Computer science Data protection Data encryption (Computer science) Information systems Information Systems Computer Science Systems and Data Security Management of Computing and Information Systems Data Encryption Computers and Society Information Systems and Communication Service Informatik Trusted Computing Konferenzschrift 24.08.2015-06,08,2015 Heraklion |
url | https://doi.org/10.1007/978-3-319-22846-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218229&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT contimauro trustandtrustworthycomputing8thinternationalconferencetrust2015herakliongreeceaugust24262015proceedings AT trustheraklion trustandtrustworthycomputing8thinternationalconferencetrust2015herakliongreeceaugust24262015proceedings |