Security and Trust Management [electronic resource] : 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers / edited by Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner.
Contributor(s): Cuellar, Jorge [editor.] | Lopez, Javier [editor.] | Barthe, Gilles [editor.] | Pretschner, Alexander [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 6710Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: X, 271 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642224447.Subject(s): Electronic data processing -- Management | Cryptography | Data encryption (Computer science) | Operating systems (Computers) | Computer networks | Computers and civilization | IT Operations | Cryptology | Operating Systems | Computer Communication Networks | Computers and SocietyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.068 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.No physical items for this record
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.
There are no comments for this item.