Trusted Systems (Registro nro. 202687)

MARC details
000 -LÍDER
fixed length control field 04732nam a22005415i 4500
001 - NÚMERO DE CONTROL
control field u374807
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL
control field SIRSI
005 - FECHA Y HORA DE LA ULTIMA TRANSACCIÓN
control field 20160812084253.0
007 - CAMPO FIJO DE DESCRIPCIÓN FIJA--INFORMACIÓN GENERAL
fixed length control field cr nn 008mamaa
008 - ELEMENTOS DE LONGITUD FIJA -- INFORMACIÓN GENERAL
fixed length control field 100709s2010 gw | s |||| 0|eng d
020 ## - NÚMERO INTERNACIONAL NORMALIZADO PARA LIBROS
International Standard Book Number 9783642145971
-- 978-3-642-14597-1
040 ## - FUENTE DE CATALOGACIÓN
Transcribing agency MX-MeUAM
050 #4 - SIGNATURA TOPOGRÁFICA DE LA BIBLIOTECA DEL CONGRESO
Classification number TK5105.5-5105.9
082 04 - NÚMERO DE CLASIFICACIÓN DECIMAL DEWEY
Classification number 004.6
Edition number 23
100 1# - ASIENTO PRINCIPAL--NOMBRE PERSONAL
Personal name Chen, Liqun.
Relator term editor.
245 10 - MENCIÓN DE TITULO
Title Trusted Systems
Medium [recurso electrónico] :
Remainder of title First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers /
Statement of responsibility, etc. edited by Liqun Chen, Moti Yung.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Berlin, Heidelberg :
Name of producer, publisher, distributor, manufacturer Springer Berlin Heidelberg,
Date of production, publication, distribution, manufacture, or copyright notice 2010.
300 ## - DESCRIPCIÓN FÍSICA
Extent XIV, 263p. 64 illus.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - MENCIÓN DE SERIE
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume/sequential designation 6163
505 0# - NOTA DE CONTENIDO
Formatted contents note Invited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage -- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing -- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks -- Attestation -- Remote Attestation on Function Execution (Work-in-Progress) -- Scalable Remote Attestation with Privacy Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network -- SocialClouds: Concept, Security Architecture and Some Mechanisms -- Privacy Enhanced Trusted Network Connect -- Research on Multistage Interconnection Architecture and Collision Detection Model -- Virtualization -- Trusted Virtual Domains – Design, Implementation and Lessons Learned -- Trusted Integrity Measurement and Reporting for Virtualized Platforms -- Applications -- A Feather-Weight Application Isolation Model -- Exploring Trust of Mobile Applications Based on User Behaviors -- Trusted Firmware Services Based on TPM -- Supporting Technology -- Improved Cryptanalysis of the FOX Block Cipher -- Bitwise Higher Order Differential Cryptanalysis.
520 ## - NOTA DE RESUMEN, ETC.
Summary, etc. This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion.
596 ## -
-- 19
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer science.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer Communication Networks.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data protection.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer software.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Information Systems.
650 14 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer Science.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data Encryption.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Management of Computing and Information Systems.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Algorithm Analysis and Problem Complexity.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computers and Society.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Systems and Data Security.
700 1# - ASIENTO SECUNDARIO - NOMBRE PERSONAL
Personal name Yung, Moti.
Relator term editor.
710 2# - ASIENTO SECUNDARIO - NOMBRE CORPORATIVO
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783642145964
830 #0 - ASIENTO SECUNDARIO DE SERIE--TITULO UNIFORME
Uniform title Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 6163
856 40 - LOCALIZACIÓN Y ACCESO ELECTRÓNICOS
Public note Libro electrónico
Uniform Resource Identifier <a href="http://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-14597-1">http://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-14597-1</a>
942 ## - TIPO DE MATERIAL (KOHA)
Koha item type Libro Electrónico
Existencias
Estado de retiro Fuente de clasificación Colección Ubicación permanente Ubicación actual Fecha de ingreso Total Checkouts Signatura topográfica Código de barras Date last seen Número de copia Tipo de material
    Colección de Libros Electrónicos Biblioteca Electrónica Biblioteca Electrónica     TK5105.5 -5105.9 374807-2001 12/08/2016 1 Libro Electrónico

Con tecnología Koha