| 000 | 03414nam a22005775i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-22365-5 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083808.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 110627s2011 gw | s |||| 0|eng d | ||
| 020 |
_a9783642223655 _9978-3-642-22365-5 |
||
| 024 | 7 |
_a10.1007/978-3-642-22365-5 _2doi |
|
| 050 | 4 | _aTK5105.5-5105.9 | |
| 072 | 7 |
_aUKN _2bicssc |
|
| 072 | 7 |
_aCOM075000 _2bisacsh |
|
| 082 | 0 | 4 |
_a004.6 _223 |
| 100 | 1 |
_aLee, Changhoon. _eeditor. |
|
| 245 | 1 | 0 |
_aSecure and Trust Computing, Data Management, and Applications _h[electronic resource] : _bSTA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011. Proceedings / _cedited by Changhoon Lee, Jean-Marc Seigneur, James J. Park, Roland R. Wagner. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2011. |
|
| 300 |
_aXVI, 205 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v187 |
|
| 520 | _aThis book constitutes the refereed proceedings of two workshops held in conjunction with the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, in Crete, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations. The 14 full papers of the IWCS 2011 and 10 papers of the STAVE 2011 workshop were carefully reviewed and individually selected from the lectures given at each workshop. The International Workshop on Convergence Security in Pervasive Environments, IWCS 2011, addresses the various theories and practical applications of convergence security in pervasive environments. The International Workshop on Security & Trust for Applications in Virtualized Environments, STAVE 2011, shows how current virtualization increases the sharing of compute, network and I/O resources with multiple users and applications in order to drive higher utilization rates, what replaces the traditional physical isolation boundaries with virtual ones. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aComputer software. | |
| 650 | 0 | _aInformation storage and retrieval systems. | |
| 650 | 0 | _aInformation systems. | |
| 650 | 0 | _aArtificial intelligence. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
| 650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
| 650 | 2 | 4 | _aInformation Storage and Retrieval. |
| 650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 700 | 1 |
_aSeigneur, Jean-Marc. _eeditor. |
|
| 700 | 1 |
_aPark, James J. _eeditor. |
|
| 700 | 1 |
_aWagner, Roland R. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642223648 |
| 830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v187 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-22365-5 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c108182 _d108182 |
||