Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2012
Schriftenreihe:Lecture notes in computer science 7159
Schlagworte:
Online-Zugang:Inhaltstext
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV039867106
003 DE-604
005 20120509
007 t|
008 120206s2012 xx d||| |||| 10||| eng d
015 |a 12,N04  |2 dnb 
016 7 |a 1019005092  |2 DE-101 
020 |a 3642281656  |9 3-642-28165-6 
020 |a 9783642281655  |c Pb. : ca. EUR 49.22 (DE) (freier Pr.), ca. EUR 50.60 (AT) (freier Pr.), ca. sfr 61.50 (freier Pr.)  |9 978-3-642-28165-5 
024 3 |a 9783642281655 
028 5 2 |a Best.-Nr.: 86056991 
035 |a (OCoLC)773666042 
035 |a (DE-599)DNB1019005092 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
049 |a DE-706  |a DE-83  |a DE-11  |a DE-91G 
082 0 |a 005.8  |2 22/ger 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a 004  |2 sdnb 
245 1 0 |a Engineering secure software and systems  |b 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings  |c Gilles Barthe ... (eds.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2012 
300 |a XII, 150 S.  |b graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 7159 
650 0 7 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Requirements engineering  |0 (DE-588)4213997-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Anwendungssystem  |0 (DE-588)4139375-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Softwareentwicklung  |0 (DE-588)4116522-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Trusted Computing  |0 (DE-588)7562931-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2012  |z Eindhoven  |2 gnd-content 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 2 |a Softwareentwicklung  |0 (DE-588)4116522-6  |D s 
689 0 3 |a Anwendungssystem  |0 (DE-588)4139375-2  |D s 
689 0 4 |a Requirements engineering  |0 (DE-588)4213997-1  |D s 
689 0 |5 DE-604 
689 1 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 1 1 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |D s 
689 1 2 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 1 |5 DE-604 
689 2 0 |a Trusted Computing  |0 (DE-588)7562931-8  |D s 
689 2 1 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 2 |5 DE-604 
700 1 |a Barthe, Gilles  |e Sonstige  |4 oth 
711 2 |a ESSoS  |n 4  |d 2012  |c Eindhoven  |j Sonstige  |0 (DE-588)16339038-1  |4 oth 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-3-642-28166-2 
830 0 |a Lecture notes in computer science  |v 7159  |w (DE-604)BV000000607  |9 7159 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=3964612&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024726526&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-024726526 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102 DAT 001z 2001 A 999
DE-BY-TUM_katkey 1853544
DE-BY-TUM_location 01
DE-BY-TUM_media_number 040071414916
_version_ 1820895960847351808
adam_text IMAGE 1 TABLE OF CONTENTS APPLICATION-REPLAY ATTACK ON JAVA CARDS: WHEN THE GARBAGE COLLECTOR GETS CONFUSED 1 GUILLAUME BARBU, PHILIPPE HOOGVORST, AND GUILLAUME DUC SUPPORTING THE DEVELOPMENT AND DOCUMENTATION OF ISO 27001 INFORMATION SECURITY MANAGEMENT SYSTEMS THROUGH SECURITY REQUIREMENTS ENGINEERING APPROACHES (IDEA PAPER) 14 KRISTIAN BECKERS, STEPHAN FASSBENDER, MARITTA HEISEL, JAN-CHRISTOPH KUESTER, AND HOLGER SCHMIDT TYPED ASSEMBLER FOR A RISC CRYPTO-PROCESSOR (IDEA PAPER) 22 PETER T. BREUER AND JONATHAN BOWEN TRANSVERSAL POLICY CONFLICT DETECTION 30 MATTEO MARIA CASALINO, HENRIK PLATE, AND SLIM TRABELSI CHALLENGES IN IMPLEMENTING AN END-TO-END SECURE PROTOCOL FOR JAVA ME-BASED MOBILE DATA COLLECTION IN LOW-BUDGET SETTINGS (IDEA PAPER) 38 SAMSON GEJIBO, FEDERICO MANCINI, KHALID A. MUGHAL, REMI VALVIK, AND J0RN KLUNGS0YR RUNTIME ENFORCEMENT OF INFORMATION FLOW SECURITY IN TREE MANIPULATING PROCESSES 46 MATE KOVACS AND HELMUT SEIDL FORMALISATION AND IMPLEMENTATION OF THE XACML ACCESS CONTROL MECHANISM 60 MASSIMILIANO MASI, ROSARIO PUGLIESE, AND FRANCESCO TIEZZI A TASK ORDERING APPROACH FOR AUTOMATIC TRUST ESTABLISHMENT 75 FRANCISCO MOYANO, CARMEN FERNANDEZ-GAGO, ISAAC AGUDO, AND JAVIER LOPEZ AN IDEA OF AN INDEPENDENT VALIDATION OF VULNERABILITY DISCOVERY MODELS (IDEA PAPER) 89 VIET HUNG NGUYEN AND FABIO MASSACCI A SOUND DECISION PROCEDURE FOR THE COMPOSITIONALITY OF SECRECY (IDEA PAPER) 97 MARTIN OCHOA, JAN JIIRJENS, AND DANIEL WARZECHA BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1019005092 DIGITALISIERT DURCH IMAGE 2 XII TABLE OF CONTENTS PLAGIARIZING SMARTPHONE APPLICATIONS: ATTACK STRATEGIES AND DEFENSE TECHNIQUES 106 RAHUL POTHARAJU, ANDREW NEWELL, CRISTINA NITA-ROTARU, AND XIANGYU ZHANG DESIGN OF ADAPTIVE SECURITY MECHANISMS FOR REAL-TIME EMBEDDED SYSTEMS 121 MEHRDAD SAADATMAND, ANTONIO CICCHETTI, AND MIKAEL SJOEDIN HUNTING APPLICATION-LEVEL LOGICAL ERRORS (IDEA PAPER) 135 GEORGE STERGIOPOULOS, BILL TSOUMAS, AND DIMITRIS GRITZALIS OPTIMAL TRUST MINING AND COMPUTING ON KEYED MAPREDUCE (IDEA PAPER) 143 HUAFEI ZHU AND HONG XIAO AUTHOR INDEX 151
any_adam_object 1
building Verbundindex
bvnumber BV039867106
classification_rvk SS 4800
ctrlnum (OCoLC)773666042
(DE-599)DNB1019005092
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03216nam a2200697 cb4500</leader><controlfield tag="001">BV039867106</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120509 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120206s2012 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N04</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1019005092</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642281656</subfield><subfield code="9">3-642-28165-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642281655</subfield><subfield code="c">Pb. : ca. EUR 49.22 (DE) (freier Pr.), ca. EUR 50.60 (AT) (freier Pr.), ca. sfr 61.50 (freier Pr.)</subfield><subfield code="9">978-3-642-28165-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642281655</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86056991</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)773666042</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1019005092</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering secure software and systems</subfield><subfield code="b">4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings</subfield><subfield code="c">Gilles Barthe ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 150 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7159</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Eindhoven</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barthe, Gilles</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ESSoS</subfield><subfield code="n">4</subfield><subfield code="d">2012</subfield><subfield code="c">Eindhoven</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16339038-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-28166-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7159</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7159</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3964612&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=024726526&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024726526</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2012 Eindhoven gnd-content
genre_facet Konferenzschrift 2012 Eindhoven
id DE-604.BV039867106
illustrated Illustrated
indexdate 2024-12-24T02:32:24Z
institution BVB
institution_GND (DE-588)16339038-1
isbn 3642281656
9783642281655
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-024726526
oclc_num 773666042
open_access_boolean
owner DE-706
DE-83
DE-11
DE-91G
DE-BY-TUM
owner_facet DE-706
DE-83
DE-11
DE-91G
DE-BY-TUM
physical XII, 150 S. graph. Darst.
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings
Lecture notes in computer science
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Requirements engineering (DE-588)4213997-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
Anwendungssystem (DE-588)4139375-2 gnd
Softwareentwicklung (DE-588)4116522-6 gnd
Datensicherung (DE-588)4011144-1 gnd
Trusted Computing (DE-588)7562931-8 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
subject_GND (DE-588)4709127-7
(DE-588)4293034-0
(DE-588)4213997-1
(DE-588)4274324-2
(DE-588)4139375-2
(DE-588)4116522-6
(DE-588)4011144-1
(DE-588)7562931-8
(DE-588)4830502-9
(DE-588)1071861417
title Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings
title_auth Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings
title_exact_search Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings
title_full Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings Gilles Barthe ... (eds.)
title_fullStr Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings Gilles Barthe ... (eds.)
title_full_unstemmed Engineering secure software and systems 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings Gilles Barthe ... (eds.)
title_short Engineering secure software and systems
title_sort engineering secure software and systems 4th international symposium essos 2012 eindhoven the netherlands february 16 17 2012 proceedings
title_sub 4th international symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16 - 17, 2012 ; proceedings
topic Sicherheitsprotokoll (DE-588)4709127-7 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Requirements engineering (DE-588)4213997-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
Anwendungssystem (DE-588)4139375-2 gnd
Softwareentwicklung (DE-588)4116522-6 gnd
Datensicherung (DE-588)4011144-1 gnd
Trusted Computing (DE-588)7562931-8 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
topic_facet Sicherheitsprotokoll
Zugriffskontrolle
Requirements engineering
Computersicherheit
Anwendungssystem
Softwareentwicklung
Datensicherung
Trusted Computing
Kryptoanalyse
Konferenzschrift 2012 Eindhoven
url http://deposit.dnb.de/cgi-bin/dokserv?id=3964612&prov=M&dok_var=1&dok_ext=htm
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024726526&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV000000607
work_keys_str_mv AT barthegilles engineeringsecuresoftwareandsystems4thinternationalsymposiumessos2012eindhoventhenetherlandsfebruary16172012proceedings
AT essoseindhoven engineeringsecuresoftwareandsystems4thinternationalsymposiumessos2012eindhoventhenetherlandsfebruary16172012proceedings