| 000 | 03520nam a22006015i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-32498-7 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083324.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 120814s2012 gw | s |||| 0|eng d | ||
| 020 |
_a9783642324987 _9978-3-642-32498-7 |
||
| 024 | 7 |
_a10.1007/978-3-642-32498-7 _2doi |
|
| 050 | 4 | _aQA76.76.A65 | |
| 072 | 7 |
_aUNH _2bicssc |
|
| 072 | 7 |
_aUDBD _2bicssc |
|
| 072 | 7 |
_aCOM032000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.7 _223 |
| 100 | 1 |
_aQuirchmayr, Gerald. _eeditor. |
|
| 245 | 1 | 0 |
_aMultidisciplinary Research and Practice for Information Systems _h[electronic resource] : _bIFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings / _cedited by Gerald Quirchmayr, Josef Basl, Ilsun You, Lida Xu, Edgar Weippl. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
| 300 |
_aXV, 683 p. 235 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7465 |
|
| 505 | 0 | _aCross-Domain Applications: Aspects of Modeling and Validation -- Trust, Security, Privacy and Safety -- Mobile Applications -- Data Processing and Management -- Retrieval and Complex Query Processing -- E-Commerce -- International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD). | |
| 520 | _aThis book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and validation; trust,security, privacy, and safety; mobile applications; data processing and management; retrieval and complex query processing; e-commerce; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aInformation storage and retrieval systems. | |
| 650 | 0 | _aManagement information systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aInformation Storage and Retrieval. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _ae-Commerce/e-business. |
| 650 | 2 | 4 | _aBusiness Information Systems. |
| 700 | 1 |
_aBasl, Josef. _eeditor. |
|
| 700 | 1 |
_aYou, Ilsun. _eeditor. |
|
| 700 | 1 |
_aXu, Lida. _eeditor. |
|
| 700 | 1 |
_aWeippl, Edgar. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642324970 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7465 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-32498-7 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c103498 _d103498 |
||