Narrow your search

Library

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

ULiège (1)

VIVES (1)


Resource type

book (1)


Language

English (1)


Year
From To Submit

2008 (1)

Listing 1 - 1 of 1
Sort by

Book
Trust Management II : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
Authors: ---
ISBN: 9780387094274 038709427X 0387094288 Year: 2008 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com.

Keywords

Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Systèmes informatiques --- Confiance --- Ordinateurs --- Sécurité informatique --- Commerce électronique --- Reliability --- Congresses. --- Access control --- Security measures --- Fiabilité --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer systems -- Reliability -- Congresses. --- Trust -- Management -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Management --- Trust (Psychology) --- Computer science. --- Computer security. --- Data structures (Computer science). --- Computers. --- Law and legislation. --- Computer Science. --- Theory of Computation. --- Computer Science, general. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- Legal Aspects of Computing. --- Attitude (Psychology) --- Emotions --- Information theory. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cyberspace --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication theory --- Communication --- Cybernetics --- Law and legislation --- Protection --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Machine theory --- Calculators --- Data protection. --- Information technology --- Data and Information Security. --- Technology and law --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Data structures (Computer science)

Listing 1 - 1 of 1
Sort by