Data and Applications Security XVII: Status and Prospects
Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivi...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2004
|
Ausgabe: | 1st ed. 2004 |
Schriftenreihe: | IFIP Advances in Information and Communication Technology
142 |
Schlagworte: | |
Online-Zugang: | UBY01 URL des Eerstveröffentlichers |
Zusammenfassung: | Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector |
Beschreibung: | 1 Online-Ressource (XXIII, 404 p) |
ISBN: | 9781402080708 |
DOI: | 10.1007/b116220 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064301 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2004 |||| o||u| ||||||eng d | ||
020 | |a 9781402080708 |9 978-1-4020-8070-8 | ||
024 | 7 | |a 10.1007/b116220 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4020-8070-8 | ||
035 | |a (OCoLC)1227478539 | ||
035 | |a (DE-599)BVBBV047064301 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.73 |2 23 | |
245 | 1 | 0 | |a Data and Applications Security XVII |b Status and Prospects |c edited by Sabrina De Capitani di Vimercati, Ray Indrakshi, Indrajit Ray |
250 | |a 1st ed. 2004 | ||
264 | 1 | |a New York, NY |b Springer US |c 2004 | |
300 | |a 1 Online-Ressource (XXIII, 404 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IFIP Advances in Information and Communication Technology |v 142 | |
520 | |a Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector | ||
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Information Storage and Retrieval | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computers | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Information storage and retrieval | |
700 | 1 | |a De Capitani di Vimercati, Sabrina |4 edt | |
700 | 1 | |a Indrakshi, Ray |4 edt | |
700 | 1 | |a Ray, Indrajit |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475780239 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781402080692 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475780222 |
856 | 4 | 0 | |u https://doi.org/10.1007/b116220 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471413 | ||
966 | e | |u https://doi.org/10.1007/b116220 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062132887552 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | De Capitani di Vimercati, Sabrina Indrakshi, Ray Ray, Indrajit |
author2_role | edt edt edt |
author2_variant | c d v s d cdvs cdvsd r i ri i r ir |
author_facet | De Capitani di Vimercati, Sabrina Indrakshi, Ray Ray, Indrajit |
building | Verbundindex |
bvnumber | BV047064301 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4020-8070-8 (OCoLC)1227478539 (DE-599)BVBBV047064301 |
dewey-full | 005.73 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.73 |
dewey-search | 005.73 |
dewey-sort | 15.73 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/b116220 |
edition | 1st ed. 2004 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03722nmm a2200529zcb4500</leader><controlfield tag="001">BV047064301</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781402080708</subfield><subfield code="9">978-1-4020-8070-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/b116220</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4020-8070-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227478539</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064301</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.73</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data and Applications Security XVII</subfield><subfield code="b">Status and Prospects</subfield><subfield code="c">edited by Sabrina De Capitani di Vimercati, Ray Indrakshi, Indrajit Ray</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2004</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXIII, 404 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">142</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Storage and Retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">De Capitani di Vimercati, Sabrina</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Indrakshi, Ray</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ray, Indrajit</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475780239</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781402080692</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475780222</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/b116220</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471413</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b116220</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064301 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9781402080708 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471413 |
oclc_num | 1227478539 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XXIII, 404 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Springer US |
record_format | marc |
series2 | IFIP Advances in Information and Communication Technology |
spelling | Data and Applications Security XVII Status and Prospects edited by Sabrina De Capitani di Vimercati, Ray Indrakshi, Indrajit Ray 1st ed. 2004 New York, NY Springer US 2004 1 Online-Ressource (XXIII, 404 p) txt rdacontent c rdamedia cr rdacarrier IFIP Advances in Information and Communication Technology 142 Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector Data Structures and Information Theory Theory of Computation Computer Communication Networks Information Storage and Retrieval Data structures (Computer science) Computers Computer communication systems Information storage and retrieval De Capitani di Vimercati, Sabrina edt Indrakshi, Ray edt Ray, Indrajit edt Erscheint auch als Druck-Ausgabe 9781475780239 Erscheint auch als Druck-Ausgabe 9781402080692 Erscheint auch als Druck-Ausgabe 9781475780222 https://doi.org/10.1007/b116220 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Data and Applications Security XVII Status and Prospects Data Structures and Information Theory Theory of Computation Computer Communication Networks Information Storage and Retrieval Data structures (Computer science) Computers Computer communication systems Information storage and retrieval |
title | Data and Applications Security XVII Status and Prospects |
title_auth | Data and Applications Security XVII Status and Prospects |
title_exact_search | Data and Applications Security XVII Status and Prospects |
title_exact_search_txtP | Data and Applications Security XVII Status and Prospects |
title_full | Data and Applications Security XVII Status and Prospects edited by Sabrina De Capitani di Vimercati, Ray Indrakshi, Indrajit Ray |
title_fullStr | Data and Applications Security XVII Status and Prospects edited by Sabrina De Capitani di Vimercati, Ray Indrakshi, Indrajit Ray |
title_full_unstemmed | Data and Applications Security XVII Status and Prospects edited by Sabrina De Capitani di Vimercati, Ray Indrakshi, Indrajit Ray |
title_short | Data and Applications Security XVII |
title_sort | data and applications security xvii status and prospects |
title_sub | Status and Prospects |
topic | Data Structures and Information Theory Theory of Computation Computer Communication Networks Information Storage and Retrieval Data structures (Computer science) Computers Computer communication systems Information storage and retrieval |
topic_facet | Data Structures and Information Theory Theory of Computation Computer Communication Networks Information Storage and Retrieval Data structures (Computer science) Computers Computer communication systems Information storage and retrieval |
url | https://doi.org/10.1007/b116220 |
work_keys_str_mv | AT decapitanidivimercatisabrina dataandapplicationssecurityxviistatusandprospects AT indrakshiray dataandapplicationssecurityxviistatusandprospects AT rayindrajit dataandapplicationssecurityxviistatusandprospects |