Normal view MARC view ISBD view

Security and Trust Management [electronic resource] : 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers / edited by Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner.

By: Cuellar, Jorge [editor.].
Contributor(s): Lopez, Javier [editor.] | Barthe, Gilles [editor.] | Pretschner, Alexander [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 6710Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Description: X, 271 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642224447.Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Information Systems | Computer Science | Management of Computing and Information Systems | Data Encryption | Operating Systems | Computer Communication Networks | Computers and SocietyDDC classification: 005.74 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue