Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Security and Trust Management

12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
BuchKartoniert, Paperback
229 Seiten
Englisch
Springererschienen am17.09.20161st ed. 2016
This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016.The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models.mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR53,49
E-BookPDF1 - PDF WatermarkE-Book
EUR53,49

Produkt

KlappentextThis book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016.The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models.
Details
ISBN/GTIN978-3-319-46597-5
ProduktartBuch
EinbandartKartoniert, Paperback
Verlag
Erscheinungsjahr2016
Erscheinungsdatum17.09.2016
Auflage1st ed. 2016
Seiten229 Seiten
SpracheEnglisch
Gewicht371 g
IllustrationenX, 229 p. 59 illus.
Artikel-Nr.15676116

Inhalt/Kritik

Inhaltsverzeichnis
Personal Security Device.- Privacy Analysis.- Linked Data.- Secure logs.- Information Security.- Security Policies.mehr

Schlagworte

Autor