Principles of security and trust: 6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin
Springer
[2017]
|
Schriftenreihe: | Lecture notes in computer science
10204 |
Schlagworte: | |
Beschreibung: | XII, 319 Seiten Diagramme |
ISBN: | 9783662544549 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV044285367 | ||
003 | DE-604 | ||
007 | t| | ||
008 | 170426s2017 xx |||| |||| 10||| eng d | ||
020 | |a 9783662544549 |9 978-3-662-54454-9 | ||
035 | |a (OCoLC)989682476 | ||
035 | |a (DE-599)BVBBV044285367 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
245 | 1 | 0 | |a Principles of security and trust |b 6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings |c Matteo Maffei, Mark Ryan (eds.) |
264 | 1 | |a Berlin |b Springer |c [2017] | |
300 | |a XII, 319 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 10204 |a Advanced research in computing and software science | |
650 | 0 | 7 | |a Formale Methode |0 (DE-588)4333722-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsfluss |0 (DE-588)4161668-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 1 | |a Informationsfluss |0 (DE-588)4161668-6 |D s |
689 | 0 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 5 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 1 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 1 | 3 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 1 | 4 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Maffei, Matteo |0 (DE-588)1065201834 |4 edt | |
711 | 2 | |a POST |n 6. |d 2017 |c Uppsala |0 (DE-588)1130728714 |4 oth | |
711 | 2 | |a ETAPS |n 20. |d 2017 |c Uppsala |0 (DE-588)1129371344 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-662-54455-6 |
830 | 0 | |a Lecture notes in computer science |v 10204 |w (DE-604)BV000000607 |9 10204 | |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029689633 |
Datensatz im Suchindex
_version_ | 1820875693693599744 |
---|---|
adam_text | |
any_adam_object | |
author2 | Maffei, Matteo |
author2_role | edt |
author2_variant | m m mm |
author_GND | (DE-588)1065201834 |
author_facet | Maffei, Matteo |
building | Verbundindex |
bvnumber | BV044285367 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)989682476 (DE-599)BVBBV044285367 |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV044285367</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">170426s2017 xx |||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662544549</subfield><subfield code="9">978-3-662-54454-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)989682476</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044285367</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles of security and trust</subfield><subfield code="b">6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings</subfield><subfield code="c">Matteo Maffei, Mark Ryan (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 319 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10204</subfield><subfield code="a">Advanced research in computing and software science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsfluss</subfield><subfield code="0">(DE-588)4161668-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationsfluss</subfield><subfield code="0">(DE-588)4161668-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maffei, Matteo</subfield><subfield code="0">(DE-588)1065201834</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">POST</subfield><subfield code="n">6.</subfield><subfield code="d">2017</subfield><subfield code="c">Uppsala</subfield><subfield code="0">(DE-588)1130728714</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ETAPS</subfield><subfield code="n">20.</subfield><subfield code="d">2017</subfield><subfield code="c">Uppsala</subfield><subfield code="0">(DE-588)1129371344</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-662-54455-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10204</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">10204</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029689633</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV044285367 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:19:42Z |
institution | BVB |
institution_GND | (DE-588)1130728714 (DE-588)1129371344 |
isbn | 9783662544549 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029689633 |
oclc_num | 989682476 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | XII, 319 Seiten Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science Advanced research in computing and software science |
spelling | Principles of security and trust 6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings Matteo Maffei, Mark Ryan (eds.) Berlin Springer [2017] XII, 319 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 10204 Advanced research in computing and software science Formale Methode (DE-588)4333722-3 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Informationsfluss (DE-588)4161668-6 gnd rswk-swf Software (DE-588)4055382-6 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Trusted Computing (DE-588)7562931-8 s Informationsfluss (DE-588)4161668-6 s Sicherheitsprotokoll (DE-588)4709127-7 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Formale Methode (DE-588)4333722-3 s DE-604 Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s Chiffrierung (DE-588)4352893-4 s Software (DE-588)4055382-6 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Maffei, Matteo (DE-588)1065201834 edt POST 6. 2017 Uppsala (DE-588)1130728714 oth ETAPS 20. 2017 Uppsala (DE-588)1129371344 oth Erscheint auch als Online-Ausgabe 978-3-662-54455-6 Lecture notes in computer science 10204 (DE-604)BV000000607 10204 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Principles of security and trust 6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings Lecture notes in computer science Formale Methode (DE-588)4333722-3 gnd Informatik (DE-588)4026894-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Informationsfluss (DE-588)4161668-6 gnd Software (DE-588)4055382-6 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Datenschutz (DE-588)4011134-9 gnd Trusted Computing (DE-588)7562931-8 gnd Chiffrierung (DE-588)4352893-4 gnd |
subject_GND | (DE-588)4333722-3 (DE-588)4026894-9 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4161668-6 (DE-588)4055382-6 (DE-588)4709127-7 (DE-588)4011144-1 (DE-588)4011134-9 (DE-588)7562931-8 (DE-588)4352893-4 (DE-588)1071861417 |
title | Principles of security and trust 6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings |
title_auth | Principles of security and trust 6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings |
title_exact_search | Principles of security and trust 6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings |
title_full | Principles of security and trust 6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings Matteo Maffei, Mark Ryan (eds.) |
title_fullStr | Principles of security and trust 6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings Matteo Maffei, Mark Ryan (eds.) |
title_full_unstemmed | Principles of security and trust 6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings Matteo Maffei, Mark Ryan (eds.) |
title_short | Principles of security and trust |
title_sort | principles of security and trust 6th international conference post 2017 held as part of the european joint conferences on theory and practice of software etaps 2017 uppsala sweden april 22 29 2017 proceedings |
title_sub | 6th international conference, POST 2017, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017 : proceedings |
topic | Formale Methode (DE-588)4333722-3 gnd Informatik (DE-588)4026894-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Informationsfluss (DE-588)4161668-6 gnd Software (DE-588)4055382-6 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Datenschutz (DE-588)4011134-9 gnd Trusted Computing (DE-588)7562931-8 gnd Chiffrierung (DE-588)4352893-4 gnd |
topic_facet | Formale Methode Informatik Kryptosystem Kryptoanalyse Informationsfluss Software Sicherheitsprotokoll Datensicherung Datenschutz Trusted Computing Chiffrierung Konferenzschrift |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT maffeimatteo principlesofsecurityandtrust6thinternationalconferencepost2017heldaspartoftheeuropeanjointconferencesontheoryandpracticeofsoftwareetaps2017uppsalaswedenapril22292017proceedings AT postuppsala principlesofsecurityandtrust6thinternationalconferencepost2017heldaspartoftheeuropeanjointconferencesontheoryandpracticeofsoftwareetaps2017uppsalaswedenapril22292017proceedings AT etapsuppsala principlesofsecurityandtrust6thinternationalconferencepost2017heldaspartoftheeuropeanjointconferencesontheoryandpracticeofsoftwareetaps2017uppsalaswedenapril22292017proceedings |