Engineering secure software and systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: ESSoS Bonn (VerfasserIn)
Weitere Verfasser: Bodden, Eric 1980- (HerausgeberIn), Payer, Mathias 1981- (HerausgeberIn), Athanasopoulos, Elias (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham Springer [2017]
Schriftenreihe:Lecture Notes in Computer Science 10379
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-91
DE-384
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV044397052
003 DE-604
005 20211228
007 cr|uuu---uuuuu
008 170705s2017 xx a||| o|||| 10||| eng d
020 |a 9783319621050  |c Online  |9 978-3-319-62105-0 
024 7 |a 10.1007/978-3-319-62105-0  |2 doi 
035 |a (ZDB-2-SCS)9783319621050 
035 |a (ZDB-2-LNC)9783319621050 
035 |a (OCoLC)1002235168 
035 |a (DE-599)BVBBV044397052 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-860  |a DE-91  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634  |a DE-384  |a DE-355  |a DE-188  |a DE-19 
082 0 |a 004.6  |2 23 
084 |a DAT 310f  |2 stub 
084 |a DAT 461f  |2 stub 
084 |a DAT 000  |2 stub 
084 |a DAT 465f  |2 stub 
111 2 |a ESSoS  |n 9.  |d 2017  |c Bonn  |j Verfasser  |0 (DE-588)1136798919  |4 aut 
245 1 0 |a Engineering secure software and systems  |b 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings  |c Eric Bodden, Mathias Payer, Elias Athanasopoulos (Eds.) 
264 1 |a Cham  |b Springer  |c [2017] 
300 |a 1 Online-Ressource (X, 240 Seiten)  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 10379  |x 0302-9743 
650 4 |a Computer science 
650 4 |a Logic design 
650 4 |a Computer communication systems 
650 4 |a Software engineering 
650 4 |a Operating systems (Computers) 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Computer Science 
650 4 |a Computer Communication Networks 
650 4 |a Systems and Data Security 
650 4 |a Logic Design 
650 4 |a Operating Systems 
650 4 |a Software Engineering 
650 4 |a Data Encryption 
650 4 |a Informatik 
650 0 7 |a Softwareschwachstelle  |0 (DE-588)4752508-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Serviceorientierte Architektur  |0 (DE-588)4841015-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Informatik  |0 (DE-588)4026894-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Modellgetriebene Entwicklung  |0 (DE-588)4832365-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Softwareentwicklung  |0 (DE-588)4116522-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Autorisierung  |0 (DE-588)4638999-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Software Engineering  |0 (DE-588)4116521-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Anwendungssystem  |0 (DE-588)4139375-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Softwarearchitektur  |0 (DE-588)4121677-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Requirements engineering  |0 (DE-588)4213997-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Chiffrierung  |0 (DE-588)4352893-4  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
689 0 0 |a Informatik  |0 (DE-588)4026894-9  |D s 
689 0 1 |a Software Engineering  |0 (DE-588)4116521-4  |D s 
689 0 2 |a Chiffrierung  |0 (DE-588)4352893-4  |D s 
689 0 3 |a Softwarearchitektur  |0 (DE-588)4121677-5  |D s 
689 0 4 |a Anwendungssystem  |0 (DE-588)4139375-2  |D s 
689 0 |5 DE-604 
689 1 0 |a Requirements engineering  |0 (DE-588)4213997-1  |D s 
689 1 1 |a Softwarearchitektur  |0 (DE-588)4121677-5  |D s 
689 1 2 |a Serviceorientierte Architektur  |0 (DE-588)4841015-9  |D s 
689 1 3 |a Softwareschwachstelle  |0 (DE-588)4752508-3  |D s 
689 1 4 |a Autorisierung  |0 (DE-588)4638999-4  |D s 
689 1 5 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 1 6 |a Modellgetriebene Entwicklung  |0 (DE-588)4832365-2  |D s 
689 1 |8 1\p  |5 DE-604 
689 2 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 2 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 2 2 |a Softwareentwicklung  |0 (DE-588)4116522-6  |D s 
689 2 3 |a Anwendungssystem  |0 (DE-588)4139375-2  |D s 
689 2 |8 2\p  |5 DE-604 
700 1 |a Bodden, Eric  |d 1980-  |0 (DE-588)1115012479  |4 edt 
700 1 |a Payer, Mathias  |d 1981-  |0 (DE-588)1089657641  |4 edt 
700 1 |a Athanasopoulos, Elias  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-319-62104-3 
830 0 |a Lecture Notes in Computer Science  |v 10379  |w (DE-604)BV014880109  |9 10379 
856 4 0 |u https://doi.org/10.1007/978-3-319-62105-0  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 2\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2017 
940 1 |q ZDB-2-LNC_2017 
943 1 |a oai:aleph.bib-bvb.de:BVB01-029799186 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-634  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-Aug4  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-573  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-M347  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-92  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-898  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-859  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-860  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-861  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-863  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-862  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-523  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-91  |p ZDB-2-LNC  |q ZDB-2-LNC_2017  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-384  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-473  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-19  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-703  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-20  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-706  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-29  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-62105-0  |l DE-739  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2273943
DE-BY-UBM_katkey 6108893
DE-BY-UBM_local_url https://doi.org/10.1007/978-3-319-62105-0
Verlag
DE-BY-UBR_katkey 5916232
_version_ 1823057452210323456
adam_text
any_adam_object
author2 Bodden, Eric 1980-
Payer, Mathias 1981-
Athanasopoulos, Elias
author2_role edt
edt
edt
author2_variant e b eb
m p mp
e a ea
author_GND (DE-588)1115012479
(DE-588)1089657641
author_corporate ESSoS Bonn
author_corporate_role aut
author_facet Bodden, Eric 1980-
Payer, Mathias 1981-
Athanasopoulos, Elias
ESSoS Bonn
author_sort ESSoS Bonn
building Verbundindex
bvnumber BV044397052
classification_rvk SS 4800
classification_tum DAT 310f
DAT 461f
DAT 000
DAT 465f
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783319621050
(ZDB-2-LNC)9783319621050
(OCoLC)1002235168
(DE-599)BVBBV044397052
dewey-full 004.6
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004.6
dewey-search 004.6
dewey-sort 14.6
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-62105-0
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV044397052</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211228</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170705s2017 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319621050</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-62105-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-62105-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319621050</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783319621050</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002235168</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044397052</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 310f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ESSoS</subfield><subfield code="n">9.</subfield><subfield code="d">2017</subfield><subfield code="c">Bonn</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1136798919</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering secure software and systems</subfield><subfield code="b">9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings</subfield><subfield code="c">Eric Bodden, Mathias Payer, Elias Athanasopoulos (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 240 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">10379</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logic design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logic Design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Modellgetriebene Entwicklung</subfield><subfield code="0">(DE-588)4832365-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Autorisierung</subfield><subfield code="0">(DE-588)4638999-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Autorisierung</subfield><subfield code="0">(DE-588)4638999-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="6"><subfield code="a">Modellgetriebene Entwicklung</subfield><subfield code="0">(DE-588)4832365-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bodden, Eric</subfield><subfield code="d">1980-</subfield><subfield code="0">(DE-588)1115012479</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Payer, Mathias</subfield><subfield code="d">1981-</subfield><subfield code="0">(DE-588)1089657641</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Athanasopoulos, Elias</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-62104-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">10379</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">10379</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2017</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2017</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029799186</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2017</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-62105-0</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV044397052
illustrated Illustrated
indexdate 2025-02-03T17:57:29Z
institution BVB
institution_GND (DE-588)1136798919
isbn 9783319621050
issn 0302-9743
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029799186
oclc_num 1002235168
open_access_boolean
owner DE-860
DE-91
DE-BY-TUM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
DE-384
DE-355
DE-BY-UBR
DE-188
DE-19
DE-BY-UBM
owner_facet DE-860
DE-91
DE-BY-TUM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
DE-384
DE-355
DE-BY-UBR
DE-188
DE-19
DE-BY-UBM
physical 1 Online-Ressource (X, 240 Seiten) Illustrationen, Diagramme
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2017
ZDB-2-LNC_2017
ZDB-2-LNC ZDB-2-LNC_2017
publishDate 2017
publishDateSearch 2017
publishDateSort 2017
publisher Springer
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spellingShingle Engineering secure software and systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings
Lecture Notes in Computer Science
Computer science
Logic design
Computer communication systems
Software engineering
Operating systems (Computers)
Computer security
Data encryption (Computer science)
Computer Science
Computer Communication Networks
Systems and Data Security
Logic Design
Operating Systems
Software Engineering
Data Encryption
Informatik
Softwareschwachstelle (DE-588)4752508-3 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Serviceorientierte Architektur (DE-588)4841015-9 gnd
Informatik (DE-588)4026894-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Modellgetriebene Entwicklung (DE-588)4832365-2 gnd
Softwareentwicklung (DE-588)4116522-6 gnd
Autorisierung (DE-588)4638999-4 gnd
Datensicherung (DE-588)4011144-1 gnd
Software Engineering (DE-588)4116521-4 gnd
Anwendungssystem (DE-588)4139375-2 gnd
Softwarearchitektur (DE-588)4121677-5 gnd
Requirements engineering (DE-588)4213997-1 gnd
Chiffrierung (DE-588)4352893-4 gnd
subject_GND (DE-588)4752508-3
(DE-588)4830502-9
(DE-588)4841015-9
(DE-588)4026894-9
(DE-588)4274324-2
(DE-588)4832365-2
(DE-588)4116522-6
(DE-588)4638999-4
(DE-588)4011144-1
(DE-588)4116521-4
(DE-588)4139375-2
(DE-588)4121677-5
(DE-588)4213997-1
(DE-588)4352893-4
(DE-588)1071861417
title Engineering secure software and systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings
title_auth Engineering secure software and systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings
title_exact_search Engineering secure software and systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings
title_full Engineering secure software and systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Eric Bodden, Mathias Payer, Elias Athanasopoulos (Eds.)
title_fullStr Engineering secure software and systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Eric Bodden, Mathias Payer, Elias Athanasopoulos (Eds.)
title_full_unstemmed Engineering secure software and systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings Eric Bodden, Mathias Payer, Elias Athanasopoulos (Eds.)
title_short Engineering secure software and systems
title_sort engineering secure software and systems 9th international symposium essos 2017 bonn germany july 3 5 2017 proceedings
title_sub 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017 : proceedings
topic Computer science
Logic design
Computer communication systems
Software engineering
Operating systems (Computers)
Computer security
Data encryption (Computer science)
Computer Science
Computer Communication Networks
Systems and Data Security
Logic Design
Operating Systems
Software Engineering
Data Encryption
Informatik
Softwareschwachstelle (DE-588)4752508-3 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Serviceorientierte Architektur (DE-588)4841015-9 gnd
Informatik (DE-588)4026894-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Modellgetriebene Entwicklung (DE-588)4832365-2 gnd
Softwareentwicklung (DE-588)4116522-6 gnd
Autorisierung (DE-588)4638999-4 gnd
Datensicherung (DE-588)4011144-1 gnd
Software Engineering (DE-588)4116521-4 gnd
Anwendungssystem (DE-588)4139375-2 gnd
Softwarearchitektur (DE-588)4121677-5 gnd
Requirements engineering (DE-588)4213997-1 gnd
Chiffrierung (DE-588)4352893-4 gnd
topic_facet Computer science
Logic design
Computer communication systems
Software engineering
Operating systems (Computers)
Computer security
Data encryption (Computer science)
Computer Science
Computer Communication Networks
Systems and Data Security
Logic Design
Operating Systems
Software Engineering
Data Encryption
Informatik
Softwareschwachstelle
Kryptoanalyse
Serviceorientierte Architektur
Computersicherheit
Modellgetriebene Entwicklung
Softwareentwicklung
Autorisierung
Datensicherung
Anwendungssystem
Softwarearchitektur
Requirements engineering
Chiffrierung
Konferenzschrift
url https://doi.org/10.1007/978-3-319-62105-0
volume_link (DE-604)BV014880109
work_keys_str_mv AT essosbonn engineeringsecuresoftwareandsystems9thinternationalsymposiumessos2017bonngermanyjuly352017proceedings
AT boddeneric engineeringsecuresoftwareandsystems9thinternationalsymposiumessos2017bonngermanyjuly352017proceedings
AT payermathias engineeringsecuresoftwareandsystems9thinternationalsymposiumessos2017bonngermanyjuly352017proceedings
AT athanasopouloselias engineeringsecuresoftwareandsystems9thinternationalsymposiumessos2017bonngermanyjuly352017proceedings