Data and applications security and privacy XXIV: 24th annual IFIP WG 11.3 working conference, Rome, Italy, June 21-23, 2010 ; proceedings
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | Englisch |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture Notes in Computer Science
6166 |
Schlagwörter: | |
Links: | http://deposit.dnb.de/cgi-bin/dokserv?id=3476865&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020435815&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XIII, 376 S. graph. Darst. |
ISBN: | 9783642137389 3642137385 |
Internformat
MARC
LEADER | 00000nam a22000002cb4500 | ||
---|---|---|---|
001 | BV036513657 | ||
003 | DE-604 | ||
005 | 20220113 | ||
007 | t| | ||
008 | 100621s2010 xx d||| |||| 10||| eng d | ||
016 | 7 | |a 1002541042 |2 DE-101 | |
020 | |a 9783642137389 |9 978-3-642-13738-9 | ||
020 | |a 3642137385 |9 3-642-13738-5 | ||
024 | 3 | |a 9783642137389 | |
028 | 5 | 2 | |a 80016179 |
035 | |a (OCoLC)699699013 | ||
035 | |a (DE-599)DNB1002541042 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-11 |a DE-91G |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Data and applications security and privacy XXIV |b 24th annual IFIP WG 11.3 working conference, Rome, Italy, June 21-23, 2010 ; proceedings |c Sara Foresti ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XIII, 376 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 6166 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Abfrageverarbeitung |0 (DE-588)4378490-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenbanksystem |0 (DE-588)4113276-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Rom |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 2 | |a Datenbanksystem |0 (DE-588)4113276-2 |D s |
689 | 0 | 3 | |a Abfrageverarbeitung |0 (DE-588)4378490-2 |D s |
689 | 0 | 4 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | |5 DE-101 | |
689 | 1 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 1 | 1 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |D s |
689 | 1 | |5 DE-101 | |
700 | 1 | |a Foresti, Sara |4 edt | |
711 | 2 | |a Working Conference on Data and Applications Security and Privacy |n 24 |d 2010 |c Rom |j Sonstige |0 (DE-588)16071393-6 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 6166 |w (DE-604)BV000000607 |9 6166 | |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3476865&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020435815&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020435815 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 001z 2001 A 999-6166 |
---|---|
DE-BY-TUM_katkey | 1737074 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040010234078 |
_version_ | 1821934938435354624 |
adam_text |
TABLE OF CONTENTS QUERY AND DATA PRIVACY GENERALIZING PIR FOR PRACTICAL
PRIVATE RETRIEVAL OF PUBLIC DATA 1 SHIYUAN WANG, DIVYAKANT AGRAWAL, AND
AMR EL ABBADI A LOGIC OF PRIVACY 17 STEVE BARKER AND VALERIO GENOVESE
UNDERSTANDING PRIVACY RISK OF PUBLISHING DECISION TREES 33 ZUTAO ZHU AND
WENLIANG DU DATA PROTECTION SECURE OUTSOURCING OF DNA SEARCHING VIA
FINITE AUTOMATA 49 MARINA BLANTON AND MEHRDAD ALIASGARI A LABELLING
SYSTEM FOR DERIVED DATA CONTROL 65 ENRICO SCALAVINO, VAIBHAV GOWADIA,
AND EMIL C. LUPU ON THE IDENTIFICATION OF PROPERTY BASED GENERALIZATIONS
IN MICRODATA ANONYMIZATION 81 RINKU DEWRI, INDRAJIT RAY, INDRAKSHI RAY,
AND DARRELL WHITLEY ACCESS CONTROL ROLE MINING IN THE PRESENCE OF NOISE
97 JAIDEEP VAIDYA, VIJAYALAKSHMI ATLURI, QI GUO, AND HAIBING LU
DISTRIBUTED AND SECURE ACCESS CONTROL IN P2P DATABASES 113 ANGELA
BONIFATI, RUILIN LIU, AND HUI (WENDY) WANG CONSTRUCTING KEY ASSIGNMENT
SCHEMES FROM CHAIN PARTITIONS 130 JASON CRAMPTON, ROSLI DAUD, AND KEITH
M. MARTIN DATA CONFIDENTIALITY AND QUERY VERIFICATION /QUERY: SPARQL
QUERY REWRITING TO ENFORCE DATA CONFIDENTIALITY . 146 SAID
OULMAKHZOUNE, NORA CUPPENS-BOULAHIA, FREDERIC CUPPENS, AND STEPHANE
MORUCCI EFFICIEN BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/1002541042 DIGITALISIERT DURCH XII TABLE OF CONTENTS
QUERY RACING: FAST COMPLETENESS CERTIFICATION OF QUERY RESULTS 177
BERNARDO PALAZZI, MAURIZIO PIZZONIA, AND STEFANO PUCACCO POLICY
DEFINITION AND ENFORCEMENT MINING LIKELY PROPERTIES OF ACCESS CONTROL
POLICIES VIA ASSOCIATION RULE MINING 193 JEEHYUN HWANG, TAO XIE, VINCENT
HU, AND MINE ALTUNAY SCALABLE AND EFFICIENT REASONING FOR ENFORCING
ROLE-BASED ACCESS CONTROL 209 TYRONE CADENHEAD, MURAT KANTARCIOGLU, AND
BHAVANI THURAISINGHAM ENFORCING REQUEST INTEGRITY IN WEB APPLICATIONS
225 KARTHICK JAYARAMAN, GRZEGORZ LEWANDOWSKI, PAUL G. TALAGA, AND STEVE
J. CHAPIN TRUST AND IDENTITY MANAGEMENT USING TRUST-BASED INFORMATION
AGGREGATION FOR PREDICTING SECURITY LEVEL OF SYSTEMS 241 SIV HILDE
HOUMB, SUDIP CHAKRABORTY, INDRAKSHI RAY, AND INDRAJIT RAY MODELLING
DYNAMIC TRUST WITH PROPERTY BASED ATTESTATION IN TRUSTED PLATFORMS 257
AARTHI NAGARAJAN AND VIJAY VARADHARAJAN TOWARDS PRIVACY-ENHANCING
IDENTITY MANAGEMENT IN MASHUP-PROVIDING PLATFORMS 273 JAN ZIBUSCHKA,
MATTHIAS HERBERT, AND HEIKO ROSSNAGEL SHORT PAPERS AN ACCESS CONTROL
MODEL FOR WEB DATABASES 287 AHLEM BOUCHAHDA-BEN TEKAYA, NHAN LE THANH,
ADEL BOUHOULA, AND FATEN LABBENE-AYACHI MODELLING DYNAMIC ACCESS CONTROL
POLICIES FOR WEB-BASED COLLABORATIV TABLE OF CONTENTS XIII PRESERVING
INTEGRITY AND CONFIDENTIALITY OF A DIRECTED ACYCLIC GRAPH MODEL OF
PROVENANCE 311 AMRIL SYALIM, TAKASHI NISHIDE, AND KOUICHI SAKURAI WHEN
ABE MEETS RSS 319 YU CHEN, HYUN SUNG KIM, JIANBIN HU, AND ZHONG CHEN
PRIMAN: A PRIVACY-PRESERVING IDENTITY FRAMEWORK 327 KRISTOF VERSLYPE,
PIETER VERHAEGHE, JOERN LAPON, VINCENT NAESSENS, AND BART DE DECKER
DETECTING SPAM BOTS IN ONLINE SOCIAL NETWORKING SITES: A MACHINE
LEARNING APPROACH 335 ALEX HAI WANG AUTHENTICATION ASSURANCE LEVEL
TAXONOMIES FOR SMART IDENTITY TOKEN DEPLOYMENTS - A NEW APPROACH 343
RAMASWAMY CHANDRAMOULI A SECURE RFID TICKET SYSTEM FOR PUBLIC TRANSPORT
350 KUN PENG AND FENG BAO PERFORMANCE EVALUATION OF NON-PARALLELIZABLE
CLIENT PUZZLES FOR DEFEATING DOS ATTACKS IN AUTHENTICATION PROTOCOLS 358
SURATOSE TRITILANUNT SECURE LOCATION VERIFICATION: A SECURITY ANALYSIS
OF GPS SIGNAL AUTHENTICATION 366 GEORG T. BECKER, SHERMAN C. LO, DAVID
S. DE LORENZO, PER K. ENGE, AND CHRISTOF PAAR AUTHOR INDEX 375 |
any_adam_object | 1 |
author2 | Foresti, Sara |
author2_role | edt |
author2_variant | s f sf |
author_facet | Foresti, Sara |
building | Verbundindex |
bvnumber | BV036513657 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 465f DAT 050f |
ctrlnum | (OCoLC)699699013 (DE-599)DNB1002541042 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000002cb4500</leader><controlfield tag="001">BV036513657</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220113</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">100621s2010 xx d||| |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1002541042</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642137389</subfield><subfield code="9">978-3-642-13738-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642137385</subfield><subfield code="9">3-642-13738-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642137389</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">80016179</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)699699013</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1002541042</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data and applications security and privacy XXIV</subfield><subfield code="b">24th annual IFIP WG 11.3 working conference, Rome, Italy, June 21-23, 2010 ; proceedings</subfield><subfield code="c">Sara Foresti ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 376 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">6166</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Abfrageverarbeitung</subfield><subfield code="0">(DE-588)4378490-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Rom</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Abfrageverarbeitung</subfield><subfield code="0">(DE-588)4378490-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-101</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-101</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Foresti, Sara</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Working Conference on Data and Applications Security and Privacy</subfield><subfield code="n">24</subfield><subfield code="d">2010</subfield><subfield code="c">Rom</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16071393-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">6166</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6166</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3476865&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020435815&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020435815</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Rom gnd-content |
genre_facet | Konferenzschrift 2010 Rom |
id | DE-604.BV036513657 |
illustrated | Illustrated |
indexdate | 2025-01-11T19:02:29Z |
institution | BVB |
institution_GND | (DE-588)16071393-6 |
isbn | 9783642137389 3642137385 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020435815 |
oclc_num | 699699013 |
open_access_boolean | |
owner | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
physical | XIII, 376 S. graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spellingShingle | Data and applications security and privacy XXIV 24th annual IFIP WG 11.3 working conference, Rome, Italy, June 21-23, 2010 ; proceedings Lecture Notes in Computer Science Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Identitätsverwaltung (DE-588)7546673-9 gnd Privatsphäre (DE-588)4123980-5 gnd Abfrageverarbeitung (DE-588)4378490-2 gnd Datenbanksystem (DE-588)4113276-2 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)7546673-9 (DE-588)4123980-5 (DE-588)4378490-2 (DE-588)4113276-2 (DE-588)7562931-8 (DE-588)1071861417 |
title | Data and applications security and privacy XXIV 24th annual IFIP WG 11.3 working conference, Rome, Italy, June 21-23, 2010 ; proceedings |
title_auth | Data and applications security and privacy XXIV 24th annual IFIP WG 11.3 working conference, Rome, Italy, June 21-23, 2010 ; proceedings |
title_exact_search | Data and applications security and privacy XXIV 24th annual IFIP WG 11.3 working conference, Rome, Italy, June 21-23, 2010 ; proceedings |
title_full | Data and applications security and privacy XXIV 24th annual IFIP WG 11.3 working conference, Rome, Italy, June 21-23, 2010 ; proceedings Sara Foresti ... (eds.) |
title_fullStr | Data and applications security and privacy XXIV 24th annual IFIP WG 11.3 working conference, Rome, Italy, June 21-23, 2010 ; proceedings Sara Foresti ... (eds.) |
title_full_unstemmed | Data and applications security and privacy XXIV 24th annual IFIP WG 11.3 working conference, Rome, Italy, June 21-23, 2010 ; proceedings Sara Foresti ... (eds.) |
title_short | Data and applications security and privacy XXIV |
title_sort | data and applications security and privacy xxiv 24th annual ifip wg 11 3 working conference rome italy june 21 23 2010 proceedings |
title_sub | 24th annual IFIP WG 11.3 working conference, Rome, Italy, June 21-23, 2010 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Identitätsverwaltung (DE-588)7546673-9 gnd Privatsphäre (DE-588)4123980-5 gnd Abfrageverarbeitung (DE-588)4378490-2 gnd Datenbanksystem (DE-588)4113276-2 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Datensicherung Zugriffskontrolle Identitätsverwaltung Privatsphäre Abfrageverarbeitung Datenbanksystem Trusted Computing Konferenzschrift 2010 Rom |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3476865&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020435815&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT forestisara dataandapplicationssecurityandprivacyxxiv24thannualifipwg113workingconferenceromeitalyjune21232010proceedings AT workingconferenceondataandapplicationssecurityandprivacyrom dataandapplicationssecurityandprivacyxxiv24thannualifipwg113workingconferenceromeitalyjune21232010proceedings |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Teilbibliothek Mathematik & Informatik
Signatur: |
0102 DAT 001z 2001 A 999-6166
Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |