LEADER 03732nam 22007575 450 001 9910483476903321 005 20200629202254.0 010 $a3-319-46598-8 024 7 $a10.1007/978-3-319-46598-2 035 $a(CKB)3710000000872954 035 $a(DE-He213)978-3-319-46598-2 035 $a(MiAaPQ)EBC6286604 035 $a(MiAaPQ)EBC5592650 035 $a(Au-PeEL)EBL5592650 035 $a(OCoLC)958973292 035 $a(PPN)19551128X 035 $a(EXLCZ)993710000000872954 100 $a20160916d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Trust Management $e12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings /$fedited by Gilles Barthe, Evangelos Markatos, Pierangela Samarati 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (X, 229 p. 59 illus.) 225 1 $aSecurity and Cryptology ;$v9871 311 $a3-319-46597-X 320 $aIncludes bibliographical references and index. 327 $aPersonal Security Device -- Privacy Analysis -- Linked Data -- Secure logs -- Information Security -- Security Policies. 330 $aThis book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016. The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models. . 410 0$aSecurity and Cryptology ;$v9871 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aApplication software 606 $aComputers and civilization 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aComputers and civilization. 615 14$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputers and Society. 676 $a005.8 702 $aBarthe$b Gilles$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMarkatos$b Evangelos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSamarati$b Pierangela$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483476903321 996 $aSecurity and Trust Management$93590338 997 $aUNINA