Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7159 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV039867106 | ||
003 | DE-604 | ||
005 | 20120509 | ||
007 | t| | ||
008 | 120206s2012 xx d||| |||| 10||| eng d | ||
015 | |a 12,N04 |2 dnb | ||
016 | 7 | |a 1019005092 |2 DE-101 | |
020 | |a 3642281656 |9 3-642-28165-6 | ||
020 | |a 9783642281655 |c Pb. : ca. EUR 49.22 (DE) (freier Pr.), ca. EUR 50.60 (AT) (freier Pr.), ca. sfr 61.50 (freier Pr.) |9 978-3-642-28165-5 | ||
024 | 3 | |a 9783642281655 | |
028 | 5 | 2 | |a Best.-Nr.: 86056991 |
035 | |a (OCoLC)773666042 | ||
035 | |a (DE-599)DNB1019005092 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Engineering secure software and systems |b 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings |c Gilles Barthe ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XII, 150 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7159 | |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Requirements engineering |0 (DE-588)4213997-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Eindhoven |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 0 | 3 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 0 | 4 | |a Requirements engineering |0 (DE-588)4213997-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 1 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | 2 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 2 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Barthe, Gilles |e Sonstige |4 oth | |
711 | 2 | |a ESSoS |n 4 |d 2012 |c Eindhoven |j Sonstige |0 (DE-588)16339038-1 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-28166-2 |
830 | 0 | |a Lecture notes in computer science |v 7159 |w (DE-604)BV000000607 |9 7159 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3964612&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024726526&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024726526 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 001z 2001 A 999 |
---|---|
DE-BY-TUM_katkey | 1853544 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040071414916 |
_version_ | 1820895960847351808 |
adam_text | IMAGE 1
TABLE OF CONTENTS
APPLICATION-REPLAY ATTACK ON JAVA CARDS: WHEN THE GARBAGE COLLECTOR GETS
CONFUSED 1
GUILLAUME BARBU, PHILIPPE HOOGVORST, AND GUILLAUME DUC
SUPPORTING THE DEVELOPMENT AND DOCUMENTATION OF ISO 27001 INFORMATION
SECURITY MANAGEMENT SYSTEMS THROUGH SECURITY REQUIREMENTS ENGINEERING
APPROACHES (IDEA PAPER) 14
KRISTIAN BECKERS, STEPHAN FASSBENDER, MARITTA HEISEL, JAN-CHRISTOPH
KUESTER, AND HOLGER SCHMIDT
TYPED ASSEMBLER FOR A RISC CRYPTO-PROCESSOR (IDEA PAPER) 22 PETER T.
BREUER AND JONATHAN BOWEN
TRANSVERSAL POLICY CONFLICT DETECTION 30
MATTEO MARIA CASALINO, HENRIK PLATE, AND SLIM TRABELSI
CHALLENGES IN IMPLEMENTING AN END-TO-END SECURE PROTOCOL FOR JAVA
ME-BASED MOBILE DATA COLLECTION IN LOW-BUDGET SETTINGS (IDEA PAPER) 38
SAMSON GEJIBO, FEDERICO MANCINI, KHALID A. MUGHAL, REMI VALVIK, AND J0RN
KLUNGS0YR
RUNTIME ENFORCEMENT OF INFORMATION FLOW SECURITY IN TREE MANIPULATING
PROCESSES 46
MATE KOVACS AND HELMUT SEIDL
FORMALISATION AND IMPLEMENTATION OF THE XACML ACCESS CONTROL MECHANISM
60
MASSIMILIANO MASI, ROSARIO PUGLIESE, AND FRANCESCO TIEZZI
A TASK ORDERING APPROACH FOR AUTOMATIC TRUST ESTABLISHMENT 75 FRANCISCO
MOYANO, CARMEN FERNANDEZ-GAGO, ISAAC AGUDO, AND JAVIER LOPEZ
AN IDEA OF AN INDEPENDENT VALIDATION OF VULNERABILITY DISCOVERY MODELS
(IDEA PAPER) 89
VIET HUNG NGUYEN AND FABIO MASSACCI
A SOUND DECISION PROCEDURE FOR THE COMPOSITIONALITY OF SECRECY (IDEA
PAPER) 97
MARTIN OCHOA, JAN JIIRJENS, AND DANIEL WARZECHA
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1019005092
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
PLAGIARIZING SMARTPHONE APPLICATIONS: ATTACK STRATEGIES AND DEFENSE
TECHNIQUES 106
RAHUL POTHARAJU, ANDREW NEWELL, CRISTINA NITA-ROTARU, AND XIANGYU ZHANG
DESIGN OF ADAPTIVE SECURITY MECHANISMS FOR REAL-TIME EMBEDDED SYSTEMS
121
MEHRDAD SAADATMAND, ANTONIO CICCHETTI, AND MIKAEL SJOEDIN
HUNTING APPLICATION-LEVEL LOGICAL ERRORS (IDEA PAPER) 135
GEORGE STERGIOPOULOS, BILL TSOUMAS, AND DIMITRIS GRITZALIS
OPTIMAL TRUST MINING AND COMPUTING ON KEYED MAPREDUCE (IDEA PAPER) 143
HUAFEI ZHU AND HONG XIAO
AUTHOR INDEX 151
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV039867106 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)773666042 (DE-599)DNB1019005092 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03216nam a2200697 cb4500</leader><controlfield tag="001">BV039867106</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120509 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120206s2012 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N04</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1019005092</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642281656</subfield><subfield code="9">3-642-28165-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642281655</subfield><subfield code="c">Pb. : ca. EUR 49.22 (DE) (freier Pr.), ca. EUR 50.60 (AT) (freier Pr.), ca. sfr 61.50 (freier Pr.)</subfield><subfield code="9">978-3-642-28165-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642281655</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86056991</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)773666042</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1019005092</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering secure software and systems</subfield><subfield code="b">4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings</subfield><subfield code="c">Gilles Barthe ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 150 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7159</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Eindhoven</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barthe, Gilles</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ESSoS</subfield><subfield code="n">4</subfield><subfield code="d">2012</subfield><subfield code="c">Eindhoven</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16339038-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-28166-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7159</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7159</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3964612&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024726526&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024726526</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Eindhoven gnd-content |
genre_facet | Konferenzschrift 2012 Eindhoven |
id | DE-604.BV039867106 |
illustrated | Illustrated |
indexdate | 2024-12-24T02:32:24Z |
institution | BVB |
institution_GND | (DE-588)16339038-1 |
isbn | 3642281656 9783642281655 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024726526 |
oclc_num | 773666042 |
open_access_boolean | |
owner | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
physical | XII, 150 S. graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spellingShingle | Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings Lecture notes in computer science Sicherheitsprotokoll (DE-588)4709127-7 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Requirements engineering (DE-588)4213997-1 gnd Computersicherheit (DE-588)4274324-2 gnd Anwendungssystem (DE-588)4139375-2 gnd Softwareentwicklung (DE-588)4116522-6 gnd Datensicherung (DE-588)4011144-1 gnd Trusted Computing (DE-588)7562931-8 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
subject_GND | (DE-588)4709127-7 (DE-588)4293034-0 (DE-588)4213997-1 (DE-588)4274324-2 (DE-588)4139375-2 (DE-588)4116522-6 (DE-588)4011144-1 (DE-588)7562931-8 (DE-588)4830502-9 (DE-588)1071861417 |
title | Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings |
title_auth | Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings |
title_exact_search | Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings |
title_full | Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings Gilles Barthe ... (eds.) |
title_fullStr | Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings Gilles Barthe ... (eds.) |
title_full_unstemmed | Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings Gilles Barthe ... (eds.) |
title_short | Engineering secure software and systems |
title_sort | engineering secure software and systems 4th international symposium essos 2012 eindhoven the netherlands february 16 17 2012 proceedings |
title_sub | 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings |
topic | Sicherheitsprotokoll (DE-588)4709127-7 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Requirements engineering (DE-588)4213997-1 gnd Computersicherheit (DE-588)4274324-2 gnd Anwendungssystem (DE-588)4139375-2 gnd Softwareentwicklung (DE-588)4116522-6 gnd Datensicherung (DE-588)4011144-1 gnd Trusted Computing (DE-588)7562931-8 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
topic_facet | Sicherheitsprotokoll Zugriffskontrolle Requirements engineering Computersicherheit Anwendungssystem Softwareentwicklung Datensicherung Trusted Computing Kryptoanalyse Konferenzschrift 2012 Eindhoven |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3964612&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024726526&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT barthegilles engineeringsecuresoftwareandsystems4thinternationalsymposiumessos2012eindhoventhenetherlandsfebruary16172012proceedings AT essoseindhoven engineeringsecuresoftwareandsystems4thinternationalsymposiumessos2012eindhoventhenetherlandsfebruary16172012proceedings |