Engineering secure software and systems: 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Tagungsbericht Buch |
Sprache: | Englisch |
Veröffentlicht: |
Cham
Springer
[2017]
|
Schriftenreihe: | Lecture notes in computer science
10379 |
Schlagwörter: | |
Umfang: | X, 239 Seiten Illustrationen, Diagramme |
ISBN: | 9783319621043 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV044411062 | ||
003 | DE-604 | ||
007 | t| | ||
008 | 170714s2017 xx a||| |||| 10||| eng d | ||
020 | |a 9783319621043 |9 978-3-319-62104-3 | ||
035 | |a (OCoLC)998217582 | ||
035 | |a (DE-599)BVBBV044411062 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 004.6 |2 23 | |
111 | 2 | |a ESSoS |n 9. |d 2017 |c Bonn |j Verfasser |0 (DE-588)1136798919 |4 aut | |
245 | 1 | 0 | |a Engineering secure software and systems |b 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings |c Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) |
264 | 1 | |a Cham |b Springer |c [2017] | |
300 | |a X, 239 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 10379 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Logic design | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Logic Design | |
650 | 4 | |a Operating Systems | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Modellgetriebene Entwicklung |0 (DE-588)4832365-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Autorisierung |0 (DE-588)4638999-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software Engineering |0 (DE-588)4116521-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Requirements engineering |0 (DE-588)4213997-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarearchitektur |0 (DE-588)4121677-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 0 | 3 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Requirements engineering |0 (DE-588)4213997-1 |D s |
689 | 1 | 1 | |a Softwarearchitektur |0 (DE-588)4121677-5 |D s |
689 | 1 | 2 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |D s |
689 | 1 | 3 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 1 | 4 | |a Autorisierung |0 (DE-588)4638999-4 |D s |
689 | 1 | 5 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 6 | |a Modellgetriebene Entwicklung |0 (DE-588)4832365-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 2 | 1 | |a Software Engineering |0 (DE-588)4116521-4 |D s |
689 | 2 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 2 | 3 | |a Softwarearchitektur |0 (DE-588)4121677-5 |D s |
689 | 2 | 4 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
700 | 1 | |a Bodden, Eric |d 1980- |0 (DE-588)1115012479 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-62105-0 |
830 | 0 | |a Lecture notes in computer science |v 10379 |w (DE-604)BV000000607 |9 10379 | |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029812872 |
Datensatz im Suchindex
_version_ | 1820980682306879488 |
---|---|
adam_text | |
any_adam_object | |
author2 | Bodden, Eric 1980- |
author2_role | edt |
author2_variant | e b eb |
author_GND | (DE-588)1115012479 |
author_corporate | ESSoS Bonn |
author_corporate_role | aut |
author_facet | Bodden, Eric 1980- ESSoS Bonn |
author_sort | ESSoS Bonn |
building | Verbundindex |
bvnumber | BV044411062 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)998217582 (DE-599)BVBBV044411062 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV044411062</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">170714s2017 xx a||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319621043</subfield><subfield code="9">978-3-319-62104-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)998217582</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044411062</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ESSoS</subfield><subfield code="n">9.</subfield><subfield code="d">2017</subfield><subfield code="c">Bonn</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1136798919</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering secure software and systems</subfield><subfield code="b">9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings</subfield><subfield code="c">Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 239 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10379</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logic design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logic Design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Modellgetriebene Entwicklung</subfield><subfield code="0">(DE-588)4832365-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Autorisierung</subfield><subfield code="0">(DE-588)4638999-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Autorisierung</subfield><subfield code="0">(DE-588)4638999-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="6"><subfield code="a">Modellgetriebene Entwicklung</subfield><subfield code="0">(DE-588)4832365-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="4"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bodden, Eric</subfield><subfield code="d">1980-</subfield><subfield code="0">(DE-588)1115012479</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-62105-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10379</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">10379</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029812872</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV044411062 |
illustrated | Illustrated |
indexdate | 2025-01-11T19:08:27Z |
institution | BVB |
institution_GND | (DE-588)1136798919 |
isbn | 9783319621043 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029812872 |
oclc_num | 998217582 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | X, 239 Seiten Illustrationen, Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ESSoS 9. 2017 Bonn Verfasser (DE-588)1136798919 aut Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) Cham Springer [2017] X, 239 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 10379 Computer science Logic design Computer communication systems Software engineering Operating systems (Computers) Computer security Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Logic Design Operating Systems Software Engineering Data Encryption Informatik Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Modellgetriebene Entwicklung (DE-588)4832365-2 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf Autorisierung (DE-588)4638999-4 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Software Engineering (DE-588)4116521-4 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf Requirements engineering (DE-588)4213997-1 gnd rswk-swf Softwarearchitektur (DE-588)4121677-5 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Softwareentwicklung (DE-588)4116522-6 s Anwendungssystem (DE-588)4139375-2 s DE-604 Requirements engineering (DE-588)4213997-1 s Softwarearchitektur (DE-588)4121677-5 s Serviceorientierte Architektur (DE-588)4841015-9 s Softwareschwachstelle (DE-588)4752508-3 s Autorisierung (DE-588)4638999-4 s Kryptoanalyse (DE-588)4830502-9 s Modellgetriebene Entwicklung (DE-588)4832365-2 s Informatik (DE-588)4026894-9 s Software Engineering (DE-588)4116521-4 s Chiffrierung (DE-588)4352893-4 s 1\p DE-604 Bodden, Eric 1980- (DE-588)1115012479 edt Erscheint auch als Online-Ausgabe 978-3-319-62105-0 Lecture notes in computer science 10379 (DE-604)BV000000607 10379 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Lecture notes in computer science Computer science Logic design Computer communication systems Software engineering Operating systems (Computers) Computer security Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Logic Design Operating Systems Software Engineering Data Encryption Informatik Softwareschwachstelle (DE-588)4752508-3 gnd Informatik (DE-588)4026894-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Computersicherheit (DE-588)4274324-2 gnd Modellgetriebene Entwicklung (DE-588)4832365-2 gnd Softwareentwicklung (DE-588)4116522-6 gnd Autorisierung (DE-588)4638999-4 gnd Datensicherung (DE-588)4011144-1 gnd Software Engineering (DE-588)4116521-4 gnd Anwendungssystem (DE-588)4139375-2 gnd Requirements engineering (DE-588)4213997-1 gnd Softwarearchitektur (DE-588)4121677-5 gnd Chiffrierung (DE-588)4352893-4 gnd |
subject_GND | (DE-588)4752508-3 (DE-588)4026894-9 (DE-588)4830502-9 (DE-588)4841015-9 (DE-588)4274324-2 (DE-588)4832365-2 (DE-588)4116522-6 (DE-588)4638999-4 (DE-588)4011144-1 (DE-588)4116521-4 (DE-588)4139375-2 (DE-588)4213997-1 (DE-588)4121677-5 (DE-588)4352893-4 (DE-588)1071861417 |
title | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings |
title_auth | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings |
title_exact_search | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings |
title_full | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) |
title_fullStr | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) |
title_full_unstemmed | Engineering secure software and systems 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) |
title_short | Engineering secure software and systems |
title_sort | engineering secure software and systems 9th international symposium essos 2017 bonn germany july 3 5 2017 proceedings |
title_sub | 9th international symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings |
topic | Computer science Logic design Computer communication systems Software engineering Operating systems (Computers) Computer security Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Logic Design Operating Systems Software Engineering Data Encryption Informatik Softwareschwachstelle (DE-588)4752508-3 gnd Informatik (DE-588)4026894-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Computersicherheit (DE-588)4274324-2 gnd Modellgetriebene Entwicklung (DE-588)4832365-2 gnd Softwareentwicklung (DE-588)4116522-6 gnd Autorisierung (DE-588)4638999-4 gnd Datensicherung (DE-588)4011144-1 gnd Software Engineering (DE-588)4116521-4 gnd Anwendungssystem (DE-588)4139375-2 gnd Requirements engineering (DE-588)4213997-1 gnd Softwarearchitektur (DE-588)4121677-5 gnd Chiffrierung (DE-588)4352893-4 gnd |
topic_facet | Computer science Logic design Computer communication systems Software engineering Operating systems (Computers) Computer security Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Logic Design Operating Systems Software Engineering Data Encryption Informatik Softwareschwachstelle Kryptoanalyse Serviceorientierte Architektur Computersicherheit Modellgetriebene Entwicklung Softwareentwicklung Autorisierung Datensicherung Anwendungssystem Requirements engineering Softwarearchitektur Chiffrierung Konferenzschrift |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT essosbonn engineeringsecuresoftwareandsystems9thinternationalsymposiumessos2017bonngermanyjuly352017proceedings AT boddeneric engineeringsecuresoftwareandsystems9thinternationalsymposiumessos2017bonngermanyjuly352017proceedings |