Security and Trust Management [recurso electrónico] : 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers / edited by Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 6710Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Descripción: X, 271 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642224447Tema(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Information Systems | Computer Science | Management of Computing and Information Systems | Data Encryption | Operating Systems | Computer Communication Networks | Computers and SocietyFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.74 Clasificación LoC:QA76.9.M3Recursos en línea: Libro electrónico En: Springer eBooksResumen: This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.Tipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | QA76.9 .M3 (Browse shelf(Abre debajo)) | 1 | No para préstamo | 376492-2001 |
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.
19