000 | 04426nam a22006975i 4500 | ||
---|---|---|---|
001 | 978-3-642-38908-5 | ||
003 | DE-He213 | ||
005 | 20240730190048.0 | ||
007 | cr nn 008mamaa | ||
008 | 130611s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642389085 _9978-3-642-38908-5 |
||
024 | 7 |
_a10.1007/978-3-642-38908-5 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aTrust and Trustworthy Computing _h[electronic resource] : _b6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings / _cedited by Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp. |
250 | _a1st ed. 2013. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aXIV, 278 p. 85 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7904 |
|
505 | 0 | _aTechnical tracks: key management -- Hypervisor usage -- Information flow analysis -- Trust in network measurement -- Random number generators -- Case studies that evaluate trust-based methods in practice: simulation environments for trusted platform modules -- Trust in applications running on mobile devices -- Trust across platform. Socio-economic track: investigated, how trust is managed and perceived in online environments.- How the disclosure of personal data is perceived -- Some papers probed trust issues across generations of users and for groups with special needs. | |
520 | _aThis book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9141187 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aApplication software. _9141188 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9141189 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9141190 |
700 | 1 |
_aHuth, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9141191 |
|
700 | 1 |
_aAsokan, N. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9141192 |
|
700 | 1 |
_aCapkun, Srdjan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9141193 |
|
700 | 1 |
_aFlechais, Ivan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9141194 |
|
700 | 1 |
_aColes-Kemp, Lizzie. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9141195 |
|
710 | 2 |
_aSpringerLink (Online service) _9141196 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642389078 |
776 | 0 | 8 |
_iPrinted edition: _z9783642389092 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7904 _9141197 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-38908-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93074 _d93074 |