Collaborative computer security and trust management:
Combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information ag...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey ; New York
Information Science Reference
[2010]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 URL des Erstveröffentlichers |
Zusammenfassung: | Combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information age. Covers topics such as trust-based security, threat and risk analysis, and data sharing |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xviii, 297 Seiten) |
ISBN: | 9781605664156 1605664154 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044235657 | ||
003 | DE-604 | ||
005 | 20211116 | ||
007 | cr|uuu---uuuuu | ||
008 | 170322s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781605664156 |9 978-1-60566-415-6 | ||
020 | |a 1605664154 |9 1-60566-415-4 | ||
024 | 7 | |a 10.4018/978-1-60566-414-9 |2 doi | |
035 | |a (OCoLC)979536458 | ||
035 | |a (DE-599)BVBBV044235657 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
245 | 1 | 0 | |a Collaborative computer security and trust management |c Jean-Marc Seigneur (Université de Genève, Switzerland), Adam Slagell (National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign, USA) |
264 | 1 | |a Hershey ; New York |b Information Science Reference |c [2010] | |
264 | 4 | |c © 2010 | |
300 | |a 1 Online-Ressource (xviii, 297 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references and index | ||
505 | 8 | |a Knowledge Assets, E-Networks and Trust / G. Erickson, Helen Rothberg -- Teamworking for Security / Rainer Bye, Ahmet Camtepe , Sahin Albayrak -- Tensions in Collaborative Cyber Security and how They Affect Incident Detection and Response / Glenn Fink, David McKinnon, Samuel Clements, Deborah Frincke -- Challenges in Sharing Computer and Network Logs / Adam Slagell, Kiran Lakkaraju -- Data Protection in Collaborative Business Applications / Florian Kerschbaum -- An Approach to Unified Trust Management Framework / Weiliang Zhao, Vijay Varadharajan -- Trust-Aware Recommender Systems for Open and Mobile Virtual Communities / N. Sahli, G. Lenzini -- Securing Mobile-Agent Systems through Collaboration / Mohammed Hussain, David Skillicorn -- How Trust and Reputation-Based Collaboration Impact Wireless Sensor Network Security / Noria Foukia, Nathan Lewis -- Trusted Computing for Collaboration / Joerg Abendroth, Holger Kinkelin -- Trust-Privacy Tradeoffs in Distributed Computing / Rima Deghaili, Ali Chehab, Ayman Kayssi -- A Proposition for Developing Trust and Relational Synergy in International e-Collaborative Groups / Bolanle Olaniran -- Trust-Based Usage Control in Collaborative Environment / Li Yang, Chang Phuong, Andy Novobilski, Raimund Ege | |
520 | |a Combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information age. Covers topics such as trust-based security, threat and risk analysis, and data sharing | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Public key infrastructure (Computer security) | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer crimes / Prevention | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Seigneur, Jean-Marc |4 edt | |
700 | 1 | |a Slagell, Adam |0 (DE-588)1128234394 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-60566-414-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-60566-414-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61692-219-1 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029641160 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60566-414-9 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60566-414-9 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60566-414-9 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60566-414-9 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138439829225472 |
---|---|
adam_text | |
any_adam_object | |
author2 | Seigneur, Jean-Marc Slagell, Adam |
author2_role | edt edt |
author2_variant | j m s jms a s as |
author_GND | (DE-588)1128234394 |
author_facet | Seigneur, Jean-Marc Slagell, Adam |
building | Verbundindex |
bvnumber | BV044235657 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | Knowledge Assets, E-Networks and Trust / G. Erickson, Helen Rothberg -- Teamworking for Security / Rainer Bye, Ahmet Camtepe , Sahin Albayrak -- Tensions in Collaborative Cyber Security and how They Affect Incident Detection and Response / Glenn Fink, David McKinnon, Samuel Clements, Deborah Frincke -- Challenges in Sharing Computer and Network Logs / Adam Slagell, Kiran Lakkaraju -- Data Protection in Collaborative Business Applications / Florian Kerschbaum -- An Approach to Unified Trust Management Framework / Weiliang Zhao, Vijay Varadharajan -- Trust-Aware Recommender Systems for Open and Mobile Virtual Communities / N. Sahli, G. Lenzini -- Securing Mobile-Agent Systems through Collaboration / Mohammed Hussain, David Skillicorn -- How Trust and Reputation-Based Collaboration Impact Wireless Sensor Network Security / Noria Foukia, Nathan Lewis -- Trusted Computing for Collaboration / Joerg Abendroth, Holger Kinkelin -- Trust-Privacy Tradeoffs in Distributed Computing / Rima Deghaili, Ali Chehab, Ayman Kayssi -- A Proposition for Developing Trust and Relational Synergy in International e-Collaborative Groups / Bolanle Olaniran -- Trust-Based Usage Control in Collaborative Environment / Li Yang, Chang Phuong, Andy Novobilski, Raimund Ege |
ctrlnum | (OCoLC)979536458 (DE-599)BVBBV044235657 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044235657</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211116</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170322s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781605664156</subfield><subfield code="9">978-1-60566-415-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1605664154</subfield><subfield code="9">1-60566-415-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-60566-414-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)979536458</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044235657</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Collaborative computer security and trust management</subfield><subfield code="c">Jean-Marc Seigneur (Université de Genève, Switzerland), Adam Slagell (National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2010]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 297 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Knowledge Assets, E-Networks and Trust / G. Erickson, Helen Rothberg -- Teamworking for Security / Rainer Bye, Ahmet Camtepe , Sahin Albayrak -- Tensions in Collaborative Cyber Security and how They Affect Incident Detection and Response / Glenn Fink, David McKinnon, Samuel Clements, Deborah Frincke -- Challenges in Sharing Computer and Network Logs / Adam Slagell, Kiran Lakkaraju -- Data Protection in Collaborative Business Applications / Florian Kerschbaum -- An Approach to Unified Trust Management Framework / Weiliang Zhao, Vijay Varadharajan -- Trust-Aware Recommender Systems for Open and Mobile Virtual Communities / N. Sahli, G. Lenzini -- Securing Mobile-Agent Systems through Collaboration / Mohammed Hussain, David Skillicorn -- How Trust and Reputation-Based Collaboration Impact Wireless Sensor Network Security / Noria Foukia, Nathan Lewis -- Trusted Computing for Collaboration / Joerg Abendroth, Holger Kinkelin -- Trust-Privacy Tradeoffs in Distributed Computing / Rima Deghaili, Ali Chehab, Ayman Kayssi -- A Proposition for Developing Trust and Relational Synergy in International e-Collaborative Groups / Bolanle Olaniran -- Trust-Based Usage Control in Collaborative Environment / Li Yang, Chang Phuong, Andy Novobilski, Raimund Ege</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information age. Covers topics such as trust-based security, threat and risk analysis, and data sharing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key infrastructure (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seigneur, Jean-Marc</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Slagell, Adam</subfield><subfield code="0">(DE-588)1128234394</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-60566-414-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-60566-414-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61692-219-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029641160</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-414-9</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-414-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-414-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60566-414-9</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044235657 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:06:30Z |
institution | BVB |
isbn | 9781605664156 1605664154 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029641160 |
oclc_num | 979536458 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xviii, 297 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Collaborative computer security and trust management Jean-Marc Seigneur (Université de Genève, Switzerland), Adam Slagell (National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign, USA) Hershey ; New York Information Science Reference [2010] © 2010 1 Online-Ressource (xviii, 297 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references and index Knowledge Assets, E-Networks and Trust / G. Erickson, Helen Rothberg -- Teamworking for Security / Rainer Bye, Ahmet Camtepe , Sahin Albayrak -- Tensions in Collaborative Cyber Security and how They Affect Incident Detection and Response / Glenn Fink, David McKinnon, Samuel Clements, Deborah Frincke -- Challenges in Sharing Computer and Network Logs / Adam Slagell, Kiran Lakkaraju -- Data Protection in Collaborative Business Applications / Florian Kerschbaum -- An Approach to Unified Trust Management Framework / Weiliang Zhao, Vijay Varadharajan -- Trust-Aware Recommender Systems for Open and Mobile Virtual Communities / N. Sahli, G. Lenzini -- Securing Mobile-Agent Systems through Collaboration / Mohammed Hussain, David Skillicorn -- How Trust and Reputation-Based Collaboration Impact Wireless Sensor Network Security / Noria Foukia, Nathan Lewis -- Trusted Computing for Collaboration / Joerg Abendroth, Holger Kinkelin -- Trust-Privacy Tradeoffs in Distributed Computing / Rima Deghaili, Ali Chehab, Ayman Kayssi -- A Proposition for Developing Trust and Relational Synergy in International e-Collaborative Groups / Bolanle Olaniran -- Trust-Based Usage Control in Collaborative Environment / Li Yang, Chang Phuong, Andy Novobilski, Raimund Ege Combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information age. Covers topics such as trust-based security, threat and risk analysis, and data sharing Computer security Public key infrastructure (Computer security) Data protection Computer networks / Security measures Computer crimes / Prevention Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s DE-604 Seigneur, Jean-Marc edt Slagell, Adam (DE-588)1128234394 edt Erscheint auch als Druck-Ausgabe 978-1-60566-414-9 Erscheint auch als Druck-Ausgabe 1-60566-414-6 Erscheint auch als Druck-Ausgabe 978-1-61692-219-1 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Collaborative computer security and trust management Knowledge Assets, E-Networks and Trust / G. Erickson, Helen Rothberg -- Teamworking for Security / Rainer Bye, Ahmet Camtepe , Sahin Albayrak -- Tensions in Collaborative Cyber Security and how They Affect Incident Detection and Response / Glenn Fink, David McKinnon, Samuel Clements, Deborah Frincke -- Challenges in Sharing Computer and Network Logs / Adam Slagell, Kiran Lakkaraju -- Data Protection in Collaborative Business Applications / Florian Kerschbaum -- An Approach to Unified Trust Management Framework / Weiliang Zhao, Vijay Varadharajan -- Trust-Aware Recommender Systems for Open and Mobile Virtual Communities / N. Sahli, G. Lenzini -- Securing Mobile-Agent Systems through Collaboration / Mohammed Hussain, David Skillicorn -- How Trust and Reputation-Based Collaboration Impact Wireless Sensor Network Security / Noria Foukia, Nathan Lewis -- Trusted Computing for Collaboration / Joerg Abendroth, Holger Kinkelin -- Trust-Privacy Tradeoffs in Distributed Computing / Rima Deghaili, Ali Chehab, Ayman Kayssi -- A Proposition for Developing Trust and Relational Synergy in International e-Collaborative Groups / Bolanle Olaniran -- Trust-Based Usage Control in Collaborative Environment / Li Yang, Chang Phuong, Andy Novobilski, Raimund Ege Computer security Public key infrastructure (Computer security) Data protection Computer networks / Security measures Computer crimes / Prevention Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Collaborative computer security and trust management |
title_auth | Collaborative computer security and trust management |
title_exact_search | Collaborative computer security and trust management |
title_full | Collaborative computer security and trust management Jean-Marc Seigneur (Université de Genève, Switzerland), Adam Slagell (National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign, USA) |
title_fullStr | Collaborative computer security and trust management Jean-Marc Seigneur (Université de Genève, Switzerland), Adam Slagell (National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign, USA) |
title_full_unstemmed | Collaborative computer security and trust management Jean-Marc Seigneur (Université de Genève, Switzerland), Adam Slagell (National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign, USA) |
title_short | Collaborative computer security and trust management |
title_sort | collaborative computer security and trust management |
topic | Computer security Public key infrastructure (Computer security) Data protection Computer networks / Security measures Computer crimes / Prevention Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer security Public key infrastructure (Computer security) Data protection Computer networks / Security measures Computer crimes / Prevention Datensicherung Computersicherheit Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-414-9 |
work_keys_str_mv | AT seigneurjeanmarc collaborativecomputersecurityandtrustmanagement AT slagelladam collaborativecomputersecurityandtrustmanagement |