Engineering secure software and systems: 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2017]
|
Schriftenreihe: | Lecture notes in computer science
10379 |
Schlagworte: | |
Beschreibung: | X, 239 Seiten Illustrationen, Diagramme |
ISBN: | 9783319621043 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV044411062 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 170714s2017 a||| |||| 10||| eng d | ||
020 | |a 9783319621043 |9 978-3-319-62104-3 | ||
035 | |a (OCoLC)998217582 | ||
035 | |a (DE-599)BVBBV044411062 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 004.6 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
111 | 2 | |a ESSoS |n 9. |d 2017 |c Bonn |j Verfasser |0 (DE-588)1136798919 |4 aut | |
245 | 1 | 0 | |a Engineering secure software and systems |b 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings |c Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) |
264 | 1 | |a Cham |b Springer |c [2017] | |
300 | |a X, 239 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 10379 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Logic design | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Logic Design | |
650 | 4 | |a Operating Systems | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Autorisierung |0 (DE-588)4638999-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Modellgetriebene Entwicklung |0 (DE-588)4832365-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Requirements engineering |0 (DE-588)4213997-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software Engineering |0 (DE-588)4116521-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarearchitektur |0 (DE-588)4121677-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 0 | 3 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Requirements engineering |0 (DE-588)4213997-1 |D s |
689 | 1 | 1 | |a Softwarearchitektur |0 (DE-588)4121677-5 |D s |
689 | 1 | 2 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |D s |
689 | 1 | 3 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 1 | 4 | |a Autorisierung |0 (DE-588)4638999-4 |D s |
689 | 1 | 5 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 6 | |a Modellgetriebene Entwicklung |0 (DE-588)4832365-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 2 | 1 | |a Software Engineering |0 (DE-588)4116521-4 |D s |
689 | 2 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 2 | 3 | |a Softwarearchitektur |0 (DE-588)4121677-5 |D s |
689 | 2 | 4 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
700 | 1 | |a Bodden, Eric |d 1980- |0 (DE-588)1115012479 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-62105-0 |
830 | 0 | |a Lecture notes in computer science |v 10379 |w (DE-604)BV000000607 |9 10379 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029812872 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177699961307136 |
---|---|
any_adam_object | |
author2 | Bodden, Eric 1980- |
author2_role | edt |
author2_variant | e b eb |
author_GND | (DE-588)1115012479 |
author_corporate | ESSoS Bonn |
author_corporate_role | aut |
author_facet | Bodden, Eric 1980- ESSoS Bonn |
author_sort | ESSoS Bonn |
building | Verbundindex |
bvnumber | BV044411062 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)998217582 (DE-599)BVBBV044411062 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03891nam a2200925zcb4500</leader><controlfield tag="001">BV044411062</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170714s2017 a||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319621043</subfield><subfield code="9">978-3-319-62104-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)998217582</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044411062</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ESSoS</subfield><subfield code="n">9.</subfield><subfield code="d">2017</subfield><subfield code="c">Bonn</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1136798919</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering secure software and systems</subfield><subfield code="b">9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings</subfield><subfield code="c">Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 239 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10379</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logic design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logic Design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Autorisierung</subfield><subfield code="0">(DE-588)4638999-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Modellgetriebene Entwicklung</subfield><subfield code="0">(DE-588)4832365-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Autorisierung</subfield><subfield code="0">(DE-588)4638999-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="6"><subfield code="a">Modellgetriebene Entwicklung</subfield><subfield code="0">(DE-588)4832365-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="4"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bodden, Eric</subfield><subfield code="d">1980-</subfield><subfield code="0">(DE-588)1115012479</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-62105-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10379</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">10379</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029812872</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV044411062 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:52:14Z |
institution | BVB |
institution_GND | (DE-588)1136798919 |
isbn | 9783319621043 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029812872 |
oclc_num | 998217582 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | X, 239 Seiten Illustrationen, Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ESSoS 9. 2017 Bonn Verfasser (DE-588)1136798919 aut Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) Cham Springer [2017] X, 239 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 10379 Computer science Logic design Computer communication systems Software engineering Operating systems (Computers) Computer security Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Logic Design Operating Systems Software Engineering Data Encryption Informatik Chiffrierung (DE-588)4352893-4 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Autorisierung (DE-588)4638999-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Modellgetriebene Entwicklung (DE-588)4832365-2 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf Requirements engineering (DE-588)4213997-1 gnd rswk-swf Software Engineering (DE-588)4116521-4 gnd rswk-swf Softwarearchitektur (DE-588)4121677-5 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Softwareentwicklung (DE-588)4116522-6 s Anwendungssystem (DE-588)4139375-2 s DE-604 Requirements engineering (DE-588)4213997-1 s Softwarearchitektur (DE-588)4121677-5 s Serviceorientierte Architektur (DE-588)4841015-9 s Softwareschwachstelle (DE-588)4752508-3 s Autorisierung (DE-588)4638999-4 s Kryptoanalyse (DE-588)4830502-9 s Modellgetriebene Entwicklung (DE-588)4832365-2 s Informatik (DE-588)4026894-9 s Software Engineering (DE-588)4116521-4 s Chiffrierung (DE-588)4352893-4 s 1\p DE-604 Bodden, Eric 1980- (DE-588)1115012479 edt Erscheint auch als Online-Ausgabe 978-3-319-62105-0 Lecture notes in computer science 10379 (DE-604)BV000000607 10379 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Lecture notes in computer science Computer science Logic design Computer communication systems Software engineering Operating systems (Computers) Computer security Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Logic Design Operating Systems Software Engineering Data Encryption Informatik Chiffrierung (DE-588)4352893-4 gnd Datensicherung (DE-588)4011144-1 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Softwareentwicklung (DE-588)4116522-6 gnd Informatik (DE-588)4026894-9 gnd Autorisierung (DE-588)4638999-4 gnd Computersicherheit (DE-588)4274324-2 gnd Modellgetriebene Entwicklung (DE-588)4832365-2 gnd Anwendungssystem (DE-588)4139375-2 gnd Requirements engineering (DE-588)4213997-1 gnd Software Engineering (DE-588)4116521-4 gnd Softwarearchitektur (DE-588)4121677-5 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
subject_GND | (DE-588)4352893-4 (DE-588)4011144-1 (DE-588)4752508-3 (DE-588)4116522-6 (DE-588)4026894-9 (DE-588)4638999-4 (DE-588)4274324-2 (DE-588)4832365-2 (DE-588)4139375-2 (DE-588)4213997-1 (DE-588)4116521-4 (DE-588)4121677-5 (DE-588)4841015-9 (DE-588)4830502-9 (DE-588)1071861417 |
title | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings |
title_auth | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings |
title_exact_search | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings |
title_full | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) |
title_fullStr | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) |
title_full_unstemmed | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) |
title_short | Engineering secure software and systems |
title_sort | engineering secure software and systems 9th international symposium essos 2017 bonn germany july 3 5 2017 proceedings |
title_sub | 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings |
topic | Computer science Logic design Computer communication systems Software engineering Operating systems (Computers) Computer security Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Logic Design Operating Systems Software Engineering Data Encryption Informatik Chiffrierung (DE-588)4352893-4 gnd Datensicherung (DE-588)4011144-1 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Softwareentwicklung (DE-588)4116522-6 gnd Informatik (DE-588)4026894-9 gnd Autorisierung (DE-588)4638999-4 gnd Computersicherheit (DE-588)4274324-2 gnd Modellgetriebene Entwicklung (DE-588)4832365-2 gnd Anwendungssystem (DE-588)4139375-2 gnd Requirements engineering (DE-588)4213997-1 gnd Software Engineering (DE-588)4116521-4 gnd Softwarearchitektur (DE-588)4121677-5 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
topic_facet | Computer science Logic design Computer communication systems Software engineering Operating systems (Computers) Computer security Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Logic Design Operating Systems Software Engineering Data Encryption Informatik Chiffrierung Datensicherung Softwareschwachstelle Softwareentwicklung Autorisierung Computersicherheit Modellgetriebene Entwicklung Anwendungssystem Requirements engineering Softwarearchitektur Serviceorientierte Architektur Kryptoanalyse Konferenzschrift |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT essosbonn engineeringsecuresoftwareandsystems9thinternationalsymposiumessos2017bonngermanyjuly352017proceedings AT boddeneric engineeringsecuresoftwareandsystems9thinternationalsymposiumessos2017bonngermanyjuly352017proceedings |