LEADER 03776nam 22007455 450 001 9910255010803321 005 20210127133157.0 010 $a3-319-28313-8 024 7 $a10.1007/978-3-319-28313-5 035 $a(CKB)3710000000580296 035 $a(SSID)ssj0001616579 035 $a(PQKBManifestationID)16349220 035 $a(PQKBTitleCode)TC0001616579 035 $a(PQKBWorkID)14922463 035 $a(PQKB)11318537 035 $a(DE-He213)978-3-319-28313-5 035 $a(MiAaPQ)EBC5588231 035 $a(Au-PeEL)EBL5588231 035 $a(OCoLC)934813621 035 $a(PPN)191706248 035 $a(EXLCZ)993710000000580296 100 $a20160107d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCyber Security $eSecond International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers /$fedited by Kristin Haltinner, Dilshani Sarathchandra, Jim Alves-Foss, Kevin Chang, Daniel Conte de Leon, Jia Song 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (IX, 143 p. 12 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0929 ;$v589 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-28312-X 327 $aPermissions and trust evaluation, implementation and management -- Cloud and device security and privacy -- Social implications of networked and mobile applications.-System and process assessments for improved cybersecurity. 330 $aThis book constitutes the refereed proceedings of the Second International Symposium on Cyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015. The 9 revised full papers presented were carefully reviewed and selected from 20 papers. The papers reflect four areas of scholarly work: permissions and trust evaluation, implementation and management; cloud and device security and privacy; social implications of networked and mobile applications; system and process assessments for improved cybersecurity. 410 0$aCommunications in Computer and Information Science,$x1865-0929 ;$v589 606 $aComputer security 606 $aComputers and civilization 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aComputers and civilization. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aComputers and Society. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aHaltinner$b Kristin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSarathchandra$b Dilshani$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAlves-Foss$b Jim$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChang$b Kevin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aConte de Leon$b Daniel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSong$b Jia$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910255010803321 996 $aCyber Security$91897917 997 $aUNINA