Proceedings of the 4th international conference on Engineering Secure Software and Systems

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Barthe, Gilles (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Berlin, Heidelberg Springer-Verlag 2012
Schriftenreihe:ACM Other conferences
Schlagworte:
Online-Zugang:DE-19
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV048951821
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 230510m2012 xx o|||| 00||| eng d
020 |a 9783642281655  |9 978-3-642-28165-5 
035 |a (ZDB-15-ACM)10.5555/2187203 
035 |a (OCoLC)1379396315 
035 |a (DE-599)BVBBV048951821 
040 |a DE-604  |b ger 
041 0 |a eng 
049 |a DE-19 
100 1 |a Barthe, Gilles  |e Verfasser  |4 aut 
245 1 0 |a Proceedings of the 4th international conference on Engineering Secure Software and Systems  |c Edited by Gilles Barthe, Benjamin Livshits, Riccardo Scandariato 
246 1 0 |a ESSoS'12 
264 1 |a Berlin, Heidelberg  |b Springer-Verlag  |c 2012 
300 |a 1 Online-Ressource (150 Seiten) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a ACM Other conferences 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Requirements engineering  |0 (DE-588)4213997-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Anwendungssystem  |0 (DE-588)4139375-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Trusted Computing  |0 (DE-588)7562931-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Softwareentwicklung  |0 (DE-588)4116522-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2012  |z Eindhoven  |2 gnd-content 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 2 |a Softwareentwicklung  |0 (DE-588)4116522-6  |D s 
689 0 3 |a Anwendungssystem  |0 (DE-588)4139375-2  |D s 
689 0 4 |a Requirements engineering  |0 (DE-588)4213997-1  |D s 
689 0 |5 DE-604 
689 1 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 1 1 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |D s 
689 1 2 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 1 |5 DE-604 
689 2 0 |a Trusted Computing  |0 (DE-588)7562931-8  |D s 
689 2 1 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 2 |5 DE-604 
700 1 |a Barthe, Gilles  |e Sonstige  |4 oth 
700 1 |a Livshits, Benjamin  |e Sonstige  |4 oth 
700 1 |a Scandariato, Riccardo  |e Sonstige  |4 oth 
710 2 |a Association for Computing Machinery-Digital Library  |e Sonstige  |4 oth 
710 2 |a ACM Special Interest Group on Software Engineering  |e Sonstige  |4 oth 
710 2 |a ACM SIGs  |e Sonstige  |4 oth 
856 4 0 |u https://dl.acm.org/action/showBook?doi=10.5555%2F2187203  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-15-ACM 
943 1 |a oai:aleph.bib-bvb.de:BVB01-034215669 
966 e |u https://dl.acm.org/action/showBook?doi=10.5555%2F2187203  |l DE-19  |p ZDB-15-ACM  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819314525526032384
any_adam_object
author Barthe, Gilles
author_facet Barthe, Gilles
author_role aut
author_sort Barthe, Gilles
author_variant g b gb
building Verbundindex
bvnumber BV048951821
collection ZDB-15-ACM
ctrlnum (ZDB-15-ACM)10.5555/2187203
(OCoLC)1379396315
(DE-599)BVBBV048951821
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02891nam a2200673 c 4500</leader><controlfield tag="001">BV048951821</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230510m2012 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642281655</subfield><subfield code="9">978-3-642-28165-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-15-ACM)10.5555/2187203</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1379396315</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048951821</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Barthe, Gilles</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of the 4th international conference on Engineering Secure Software and Systems</subfield><subfield code="c">Edited by Gilles Barthe, Benjamin Livshits, Riccardo Scandariato</subfield></datafield><datafield tag="246" ind1="1" ind2="0"><subfield code="a">ESSoS'12</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer-Verlag</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (150 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">ACM Other conferences</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Eindhoven</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Requirements engineering</subfield><subfield code="0">(DE-588)4213997-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barthe, Gilles</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Livshits, Benjamin</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Scandariato, Riccardo</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Association for Computing Machinery-Digital Library</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACM Special Interest Group on Software Engineering</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACM SIGs</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dl.acm.org/action/showBook?doi=10.5555%2F2187203</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-15-ACM</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034215669</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://dl.acm.org/action/showBook?doi=10.5555%2F2187203</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-15-ACM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2012 Eindhoven gnd-content
genre_facet Konferenzschrift 2012 Eindhoven
id DE-604.BV048951821
illustrated Not Illustrated
indexdate 2024-12-24T09:45:36Z
institution BVB
isbn 9783642281655
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-034215669
oclc_num 1379396315
open_access_boolean
owner DE-19
DE-BY-UBM
owner_facet DE-19
DE-BY-UBM
physical 1 Online-Ressource (150 Seiten)
psigel ZDB-15-ACM
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Springer-Verlag
record_format marc
series2 ACM Other conferences
spelling Barthe, Gilles Verfasser aut
Proceedings of the 4th international conference on Engineering Secure Software and Systems Edited by Gilles Barthe, Benjamin Livshits, Riccardo Scandariato
ESSoS'12
Berlin, Heidelberg Springer-Verlag 2012
1 Online-Ressource (150 Seiten)
txt rdacontent
c rdamedia
cr rdacarrier
ACM Other conferences
Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf
Requirements engineering (DE-588)4213997-1 gnd rswk-swf
Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf
Anwendungssystem (DE-588)4139375-2 gnd rswk-swf
Trusted Computing (DE-588)7562931-8 gnd rswk-swf
Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf
Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf
Datensicherung (DE-588)4011144-1 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
(DE-588)1071861417 Konferenzschrift 2012 Eindhoven gnd-content
Computersicherheit (DE-588)4274324-2 s
Datensicherung (DE-588)4011144-1 s
Softwareentwicklung (DE-588)4116522-6 s
Anwendungssystem (DE-588)4139375-2 s
Requirements engineering (DE-588)4213997-1 s
DE-604
Sicherheitsprotokoll (DE-588)4709127-7 s
Zugriffskontrolle (DE-588)4293034-0 s
Trusted Computing (DE-588)7562931-8 s
Kryptoanalyse (DE-588)4830502-9 s
Barthe, Gilles Sonstige oth
Livshits, Benjamin Sonstige oth
Scandariato, Riccardo Sonstige oth
Association for Computing Machinery-Digital Library Sonstige oth
ACM Special Interest Group on Software Engineering Sonstige oth
ACM SIGs Sonstige oth
https://dl.acm.org/action/showBook?doi=10.5555%2F2187203 Verlag URL des Erstveröffentlichers Volltext
spellingShingle Barthe, Gilles
Proceedings of the 4th international conference on Engineering Secure Software and Systems
Zugriffskontrolle (DE-588)4293034-0 gnd
Requirements engineering (DE-588)4213997-1 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Anwendungssystem (DE-588)4139375-2 gnd
Trusted Computing (DE-588)7562931-8 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Softwareentwicklung (DE-588)4116522-6 gnd
Datensicherung (DE-588)4011144-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4293034-0
(DE-588)4213997-1
(DE-588)4830502-9
(DE-588)4139375-2
(DE-588)7562931-8
(DE-588)4709127-7
(DE-588)4116522-6
(DE-588)4011144-1
(DE-588)4274324-2
(DE-588)1071861417
title Proceedings of the 4th international conference on Engineering Secure Software and Systems
title_alt ESSoS'12
title_auth Proceedings of the 4th international conference on Engineering Secure Software and Systems
title_exact_search Proceedings of the 4th international conference on Engineering Secure Software and Systems
title_full Proceedings of the 4th international conference on Engineering Secure Software and Systems Edited by Gilles Barthe, Benjamin Livshits, Riccardo Scandariato
title_fullStr Proceedings of the 4th international conference on Engineering Secure Software and Systems Edited by Gilles Barthe, Benjamin Livshits, Riccardo Scandariato
title_full_unstemmed Proceedings of the 4th international conference on Engineering Secure Software and Systems Edited by Gilles Barthe, Benjamin Livshits, Riccardo Scandariato
title_short Proceedings of the 4th international conference on Engineering Secure Software and Systems
title_sort proceedings of the 4th international conference on engineering secure software and systems
topic Zugriffskontrolle (DE-588)4293034-0 gnd
Requirements engineering (DE-588)4213997-1 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Anwendungssystem (DE-588)4139375-2 gnd
Trusted Computing (DE-588)7562931-8 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Softwareentwicklung (DE-588)4116522-6 gnd
Datensicherung (DE-588)4011144-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Zugriffskontrolle
Requirements engineering
Kryptoanalyse
Anwendungssystem
Trusted Computing
Sicherheitsprotokoll
Softwareentwicklung
Datensicherung
Computersicherheit
Konferenzschrift 2012 Eindhoven
url https://dl.acm.org/action/showBook?doi=10.5555%2F2187203
work_keys_str_mv AT barthegilles proceedingsofthe4thinternationalconferenceonengineeringsecuresoftwareandsystems
AT livshitsbenjamin proceedingsofthe4thinternationalconferenceonengineeringsecuresoftwareandsystems
AT scandariatoriccardo proceedingsofthe4thinternationalconferenceonengineeringsecuresoftwareandsystems
AT associationforcomputingmachinerydigitallibrary proceedingsofthe4thinternationalconferenceonengineeringsecuresoftwareandsystems
AT acmspecialinterestgrouponsoftwareengineering proceedingsofthe4thinternationalconferenceonengineeringsecuresoftwareandsystems
AT acmsigs proceedingsofthe4thinternationalconferenceonengineeringsecuresoftwareandsystems
AT barthegilles essos12
AT livshitsbenjamin essos12
AT scandariatoriccardo essos12
AT associationforcomputingmachinerydigitallibrary essos12
AT acmspecialinterestgrouponsoftwareengineering essos12
AT acmsigs essos12