Trustworthy global computing: 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2016]
|
Schriftenreihe: | Lecture Notes in Computer Science
9533 |
Schlagworte: | |
Online-Zugang: | HTW01 TUM01 UBR01 UBY01 Volltext Abstract |
Beschreibung: | 1 Online Ressource (IX, 163 Seiten) Illustrationen |
ISBN: | 9783319287669 9783319287652 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-28766-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043408066 | ||
003 | DE-604 | ||
005 | 20200514 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 160225s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783319287669 |c Online |9 978-3-319-28766-9 | ||
020 | |a 9783319287652 |c Print |9 978-3-319-28765-2 | ||
024 | 7 | |a 10.1007/978-3-319-28766-9 |2 doi | |
035 | |a (OCoLC)936782902 | ||
035 | |a (DE-599)BVBBV043408066 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-706 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 |a DE-861 |a DE-523 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 252f |2 stub | ||
245 | 1 | 0 | |a Trustworthy global computing |b 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers |c edited by Pierre Ganty, Michele Loreti |
264 | 1 | |a Cham |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online Ressource (IX, 163 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v Volume 9533 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer organization | |
650 | 4 | |a Computer security | |
650 | 4 | |a Mathematical logic | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Mathematical Logic and Formal Languages | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Model Checking |0 (DE-588)4434799-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Typprüfung |0 (DE-588)4623348-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Grid Computing |0 (DE-588)4743648-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programmverifikation |0 (DE-588)4135576-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Grid Computing |0 (DE-588)4743648-7 |D s |
689 | 0 | 1 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 1 | 1 | |a Programmverifikation |0 (DE-588)4135576-3 |D s |
689 | 1 | 2 | |a Typprüfung |0 (DE-588)4623348-9 |D s |
689 | 1 | 3 | |a Model Checking |0 (DE-588)4434799-6 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Ganty, Pierre |4 edt | |
711 | 2 | |a TGC |n 10. |d 2015 |c Madrid |j Sonstige |0 (DE-588)1083008641 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9533 |w (DE-604)BV014880109 |9 9533 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-28766-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826412&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028826412 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-28766-9 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28766-9 |l TUM01 |p ZDB-2-LNC |q ZDB-2-LNC_2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28766-9 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28766-9 |l UBY01 |p ZDB-2-LNC |q ZDB-2-LNC_2016 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175996404891648 |
---|---|
adam_text | TRUSTWORTHY GLOBAL COMPUTING
/
: 2016
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE
PROCEEDINGS OF THE 10TH INTERNATIONAL SYMPOSIUM ON TRUSTWORTHY GLOBAL
COMPUTING, TGC 2015, HELD IN MADRID, SPAIN, IN AUGUST/SEPTEMBER 2015.
THE 10 REVISED FULL PAPERS PRESENTED WERE CAREFULLY REVIEWED AND
SELECTED FROM 19 SUBMISSIONS. THE SYMPOSIUM ON TRUSTWORTHY GLOBAL
COMPUTING FOCUSES ON FRAMEWORKS, TOOLS, ALGORITHMS, AND PROTOCOLS FOR
OPEN-ENDED, LARGE-SCALE SYSTEMS AND APPLICATIONS, AND ON RIGOROUS
REASONING ABOUT THEIR BEHAVIOR AND PROPERTIES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Ganty, Pierre |
author2_role | edt |
author2_variant | p g pg |
author_facet | Ganty, Pierre |
building | Verbundindex |
bvnumber | BV043408066 |
classification_tum | DAT 460f DAT 000 DAT 465f DAT 252f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)936782902 (DE-599)BVBBV043408066 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-28766-9 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03695nmm a2200805zcb4500</leader><controlfield tag="001">BV043408066</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200514 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160225s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319287669</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-28766-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319287652</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-28765-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-28766-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)936782902</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043408066</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trustworthy global computing</subfield><subfield code="b">10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers</subfield><subfield code="c">edited by Pierre Ganty, Michele Loreti</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (IX, 163 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">Volume 9533</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer organization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematical logic</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematical Logic and Formal Languages</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Model Checking</subfield><subfield code="0">(DE-588)4434799-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Typprüfung</subfield><subfield code="0">(DE-588)4623348-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Grid Computing</subfield><subfield code="0">(DE-588)4743648-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Grid Computing</subfield><subfield code="0">(DE-588)4743648-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Typprüfung</subfield><subfield code="0">(DE-588)4623348-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Model Checking</subfield><subfield code="0">(DE-588)4434799-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ganty, Pierre</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">TGC</subfield><subfield code="n">10.</subfield><subfield code="d">2015</subfield><subfield code="c">Madrid</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1083008641</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9533</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9533</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-28766-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826412&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028826412</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28766-9</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28766-9</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28766-9</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28766-9</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043408066 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:25:09Z |
institution | BVB |
institution_GND | (DE-588)1083008641 |
isbn | 9783319287669 9783319287652 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028826412 |
oclc_num | 936782902 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-861 DE-523 |
owner_facet | DE-355 DE-BY-UBR DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-861 DE-523 |
physical | 1 Online Ressource (IX, 163 Seiten) Illustrationen |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2016 ZDB-2-LNC ZDB-2-LNC_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Trustworthy global computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers edited by Pierre Ganty, Michele Loreti Cham Springer [2016] © 2016 1 Online Ressource (IX, 163 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science Volume 9533 0302-9743 Computer science Computer organization Computer security Mathematical logic Computer Science Systems and Data Security Mathematical Logic and Formal Languages Information Systems Applications (incl. Internet) Computer Systems Organization and Communication Networks Informatik Model Checking (DE-588)4434799-6 gnd rswk-swf Typprüfung (DE-588)4623348-9 gnd rswk-swf Grid Computing (DE-588)4743648-7 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Programmverifikation (DE-588)4135576-3 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Grid Computing (DE-588)4743648-7 s Trusted Computing (DE-588)7562931-8 s Kryptologie (DE-588)4033329-2 s DE-604 Programmverifikation (DE-588)4135576-3 s Typprüfung (DE-588)4623348-9 s Model Checking (DE-588)4434799-6 s Ganty, Pierre edt TGC 10. 2015 Madrid Sonstige (DE-588)1083008641 oth Lecture Notes in Computer Science 9533 (DE-604)BV014880109 9533 https://doi.org/10.1007/978-3-319-28766-9 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826412&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Trustworthy global computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers Lecture Notes in Computer Science Computer science Computer organization Computer security Mathematical logic Computer Science Systems and Data Security Mathematical Logic and Formal Languages Information Systems Applications (incl. Internet) Computer Systems Organization and Communication Networks Informatik Model Checking (DE-588)4434799-6 gnd Typprüfung (DE-588)4623348-9 gnd Grid Computing (DE-588)4743648-7 gnd Trusted Computing (DE-588)7562931-8 gnd Programmverifikation (DE-588)4135576-3 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4434799-6 (DE-588)4623348-9 (DE-588)4743648-7 (DE-588)7562931-8 (DE-588)4135576-3 (DE-588)4033329-2 (DE-588)1071861417 |
title | Trustworthy global computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers |
title_auth | Trustworthy global computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers |
title_exact_search | Trustworthy global computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers |
title_full | Trustworthy global computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers edited by Pierre Ganty, Michele Loreti |
title_fullStr | Trustworthy global computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers edited by Pierre Ganty, Michele Loreti |
title_full_unstemmed | Trustworthy global computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers edited by Pierre Ganty, Michele Loreti |
title_short | Trustworthy global computing |
title_sort | trustworthy global computing 10th international symposium tgc 2015 madrid spain august 31 september 1 2015 revised selected papers |
title_sub | 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 : revised selected papers |
topic | Computer science Computer organization Computer security Mathematical logic Computer Science Systems and Data Security Mathematical Logic and Formal Languages Information Systems Applications (incl. Internet) Computer Systems Organization and Communication Networks Informatik Model Checking (DE-588)4434799-6 gnd Typprüfung (DE-588)4623348-9 gnd Grid Computing (DE-588)4743648-7 gnd Trusted Computing (DE-588)7562931-8 gnd Programmverifikation (DE-588)4135576-3 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer science Computer organization Computer security Mathematical logic Computer Science Systems and Data Security Mathematical Logic and Formal Languages Information Systems Applications (incl. Internet) Computer Systems Organization and Communication Networks Informatik Model Checking Typprüfung Grid Computing Trusted Computing Programmverifikation Kryptologie Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-28766-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826412&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT gantypierre trustworthyglobalcomputing10thinternationalsymposiumtgc2015madridspainaugust31september12015revisedselectedpapers AT tgcmadrid trustworthyglobalcomputing10thinternationalsymposiumtgc2015madridspainaugust31september12015revisedselectedpapers |