Cloud computing, security, privacy in new computing environments: 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings
Gespeichert in:
Körperschaften: | , |
---|---|
Weitere Verfasser: | , , , , , , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2018]
|
Schriftenreihe: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
197 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 HTW01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (XIV, 240 Seiten, 61 illus) |
ISBN: | 9783319696058 |
ISSN: | 1867-8211 |
DOI: | 10.1007/978-3-319-69605-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV044661440 | ||
003 | DE-604 | ||
005 | 20180419 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 171201s2018 |||| o||u| ||||||eng d | ||
020 | |a 9783319696058 |c Online |9 978-3-319-69605-8 | ||
024 | 7 | |a 10.1007/978-3-319-69605-8 |2 doi | |
035 | |a (ZDB-2-SCS)9783319696058 | ||
035 | |a (OCoLC)1013882057 | ||
035 | |a (DE-599)BVBBV044661440 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-573 |a DE-703 |a DE-19 |a DE-739 |a DE-20 |a DE-Aug4 |a DE-859 |a DE-860 |a DE-863 |a DE-862 |a DE-634 |a DE-29 |a DE-706 |a DE-473 |a DE-M347 |a DE-92 |a DE-898 |a DE-861 |a DE-523 | ||
082 | 0 | |a 004.6 |2 23 | |
111 | 2 | |a EAI International Conference on Cloud Computing |n 7. |d 2016 |c Kanton, Stadt |j Verfasser |0 (DE-588)1156413079 |4 aut | |
245 | 1 | 0 | |a Cloud computing, security, privacy in new computing environments |b 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings |c Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu (eds.) |
264 | 1 | |a Cham |b Springer |c [2018] | |
300 | |a 1 Online-Ressource (XIV, 240 Seiten, 61 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 197 |x 1867-8211 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Security | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2016 |z Kanton, Stadt |2 gnd-content | |
700 | 1 | |a Wan, Jiafu |0 (DE-588)1065750897 |4 edt | |
700 | 1 | |a Lin, Kai |4 edt | |
700 | 1 | |a Zeng, Delu |4 edt | |
700 | 1 | |a Li, Jin |4 edt | |
700 | 1 | |a Xiang, Yang |0 (DE-588)1053066090 |4 edt | |
700 | 1 | |a Liao, Xiaofeng |4 edt | |
700 | 1 | |a Huang, Jiwu |4 edt | |
700 | 1 | |a Liu, Zheli |4 edt | |
711 | 2 | |a EAI International Conference on Security and Privacy in New Computing Environments |n 1. |d 2016 |c Kanton, Stadt |j Verfasser |0 (DE-588)1156413303 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-69604-1 |
830 | 0 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 197 |w (DE-604)BV041557366 |9 197 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-69605-8 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2018 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030058942 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l FWS01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l FWS02 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-69605-8 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 675167 |
---|---|
_version_ | 1806182568331051008 |
any_adam_object | |
author2 | Wan, Jiafu Lin, Kai Zeng, Delu Li, Jin Xiang, Yang Liao, Xiaofeng Huang, Jiwu Liu, Zheli |
author2_role | edt edt edt edt edt edt edt edt |
author2_variant | j w jw k l kl d z dz j l jl y x yx x l xl j h jh z l zl |
author_GND | (DE-588)1065750897 (DE-588)1053066090 |
author_corporate | EAI International Conference on Cloud Computing Kanton, Stadt EAI International Conference on Security and Privacy in New Computing Environments |
author_corporate_role | aut aut |
author_facet | Wan, Jiafu Lin, Kai Zeng, Delu Li, Jin Xiang, Yang Liao, Xiaofeng Huang, Jiwu Liu, Zheli EAI International Conference on Cloud Computing Kanton, Stadt EAI International Conference on Security and Privacy in New Computing Environments |
author_sort | EAI International Conference on Cloud Computing Kanton, Stadt |
building | Verbundindex |
bvnumber | BV044661440 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9783319696058 (OCoLC)1013882057 (DE-599)BVBBV044661440 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-69605-8 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04855nmm a2200877zcb4500</leader><controlfield tag="001">BV044661440</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180419 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">171201s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319696058</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-69605-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-69605-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319696058</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013882057</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044661440</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">EAI International Conference on Cloud Computing</subfield><subfield code="n">7.</subfield><subfield code="d">2016</subfield><subfield code="c">Kanton, Stadt</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1156413079</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud computing, security, privacy in new computing environments</subfield><subfield code="b">7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings</subfield><subfield code="c">Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 240 Seiten, 61 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">197</subfield><subfield code="x">1867-8211</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2016</subfield><subfield code="z">Kanton, Stadt</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wan, Jiafu</subfield><subfield code="0">(DE-588)1065750897</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lin, Kai</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zeng, Delu</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Jin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xiang, Yang</subfield><subfield code="0">(DE-588)1053066090</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liao, Xiaofeng</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Huang, Jiwu</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Zheli</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">EAI International Conference on Security and Privacy in New Computing Environments</subfield><subfield code="n">1.</subfield><subfield code="d">2016</subfield><subfield code="c">Kanton, Stadt</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1156413303</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-69604-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">197</subfield><subfield code="w">(DE-604)BV041557366</subfield><subfield code="9">197</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2018</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030058942</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-69605-8</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2016 Kanton, Stadt gnd-content |
genre_facet | Konferenzschrift 2016 Kanton, Stadt |
id | DE-604.BV044661440 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:58:45Z |
institution | BVB |
institution_GND | (DE-588)1156413079 (DE-588)1156413303 |
isbn | 9783319696058 |
issn | 1867-8211 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030058942 |
oclc_num | 1013882057 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-573 DE-703 DE-19 DE-BY-UBM DE-739 DE-20 DE-Aug4 DE-859 DE-860 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-634 DE-29 DE-706 DE-473 DE-BY-UBG DE-M347 DE-92 DE-898 DE-BY-UBR DE-861 DE-523 |
owner_facet | DE-355 DE-BY-UBR DE-573 DE-703 DE-19 DE-BY-UBM DE-739 DE-20 DE-Aug4 DE-859 DE-860 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-634 DE-29 DE-706 DE-473 DE-BY-UBG DE-M347 DE-92 DE-898 DE-BY-UBR DE-861 DE-523 |
physical | 1 Online-Ressource (XIV, 240 Seiten, 61 illus) |
psigel | ZDB-2-SCS ZDB-2-SCS_2018 |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer |
record_format | marc |
series | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
series2 | Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
spellingShingle | Cloud computing, security, privacy in new computing environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Computer science Computer communication systems Computer security Data encryption (Computer science) Artificial intelligence Computer Science Computer Communication Networks Information Systems Applications (incl. Internet) Systems and Data Security Data Encryption Security Artificial Intelligence (incl. Robotics) |
subject_GND | (DE-588)1071861417 |
title | Cloud computing, security, privacy in new computing environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings |
title_auth | Cloud computing, security, privacy in new computing environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings |
title_exact_search | Cloud computing, security, privacy in new computing environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings |
title_full | Cloud computing, security, privacy in new computing environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu (eds.) |
title_fullStr | Cloud computing, security, privacy in new computing environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu (eds.) |
title_full_unstemmed | Cloud computing, security, privacy in new computing environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu (eds.) |
title_short | Cloud computing, security, privacy in new computing environments |
title_sort | cloud computing security privacy in new computing environments 7th international conference cloudcomp 2016 and first international conference spnce 2016 guangzhou china november 25 26 and december 15 16 2016 proceedings |
title_sub | 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016 : proceedings |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Artificial intelligence Computer Science Computer Communication Networks Information Systems Applications (incl. Internet) Systems and Data Security Data Encryption Security Artificial Intelligence (incl. Robotics) |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Artificial intelligence Computer Science Computer Communication Networks Information Systems Applications (incl. Internet) Systems and Data Security Data Encryption Security Artificial Intelligence (incl. Robotics) Konferenzschrift 2016 Kanton, Stadt |
url | https://doi.org/10.1007/978-3-319-69605-8 |
volume_link | (DE-604)BV041557366 |
work_keys_str_mv | AT eaiinternationalconferenceoncloudcomputingkantonstadt cloudcomputingsecurityprivacyinnewcomputingenvironments7thinternationalconferencecloudcomp2016andfirstinternationalconferencespnce2016guangzhouchinanovember2526anddecember15162016proceedings AT wanjiafu cloudcomputingsecurityprivacyinnewcomputingenvironments7thinternationalconferencecloudcomp2016andfirstinternationalconferencespnce2016guangzhouchinanovember2526anddecember15162016proceedings AT linkai cloudcomputingsecurityprivacyinnewcomputingenvironments7thinternationalconferencecloudcomp2016andfirstinternationalconferencespnce2016guangzhouchinanovember2526anddecember15162016proceedings AT zengdelu cloudcomputingsecurityprivacyinnewcomputingenvironments7thinternationalconferencecloudcomp2016andfirstinternationalconferencespnce2016guangzhouchinanovember2526anddecember15162016proceedings AT lijin cloudcomputingsecurityprivacyinnewcomputingenvironments7thinternationalconferencecloudcomp2016andfirstinternationalconferencespnce2016guangzhouchinanovember2526anddecember15162016proceedings AT xiangyang cloudcomputingsecurityprivacyinnewcomputingenvironments7thinternationalconferencecloudcomp2016andfirstinternationalconferencespnce2016guangzhouchinanovember2526anddecember15162016proceedings AT liaoxiaofeng cloudcomputingsecurityprivacyinnewcomputingenvironments7thinternationalconferencecloudcomp2016andfirstinternationalconferencespnce2016guangzhouchinanovember2526anddecember15162016proceedings AT huangjiwu cloudcomputingsecurityprivacyinnewcomputingenvironments7thinternationalconferencecloudcomp2016andfirstinternationalconferencespnce2016guangzhouchinanovember2526anddecember15162016proceedings AT liuzheli cloudcomputingsecurityprivacyinnewcomputingenvironments7thinternationalconferencecloudcomp2016andfirstinternationalconferencespnce2016guangzhouchinanovember2526anddecember15162016proceedings AT eaiinternationalconferenceonsecurityandprivacyinnewcomputingenvironmentskantonstadt cloudcomputingsecurityprivacyinnewcomputingenvironments7thinternationalconferencecloudcomp2016andfirstinternationalconferencespnce2016guangzhouchinanovember2526anddecember15162016proceedings |