LEADER 01999nam 2200469z- 450 001 9910346709103321 005 20210212 010 $a1000006318 035 $a(CKB)4920000000094603 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/61143 035 $a(oapen)doab61143 035 $a(EXLCZ)994920000000094603 100 $a20202102d2007 |y 0 101 0 $ager 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aTragfa?higkeit von stiftfo?rmigen Verbindungsmitteln in Brettsperrholz 210 $cKIT Scientific Publishing$d2007 215 $a1 online resource 225 1 $aKarlsruher Berichte zum Ingenieurholzbau 311 08$a3-86644-129-0 330 $aIm Rahmen dieser Forschungsarbeit wurden Vorschla?ge zur Ermittlung der Tragfa?higkeit von Verbindungen mit stiftfo?rmigen Verbindungsmitteln in den Seiten- und Schmalfla?chen von Brettsperrholz erarbeitet. Die fu?r die Berechnung erforderlichen, tragfa?higkeitsrelevanten Parameter Lochleibungsfestigkeit und Ausziehtragfa?higkeit wurden fu?r unterschiedliche Verbindungsmittel experimentell ermittelt. Hierzu mussten die bekannten Pru?fverfahren teilweise angepasst werden. Die Allgemeingu?ltigkeit der modifizierten Pru?fverfahren wurde durch Versuche mit OSB-Platten u?berpru?ft. 606 $aTechnology: general issues$2bicssc 610 $aBrett 610 $aForschungsbericht 610 $aHolz 610 $aHolzbau 610 $aHolzbauteil 610 $aHolzwerkstoff 610 $aNagel 610 $aSchraube 610 $aStabdu?bel 610 $aTragfa?higkeit 610 $aVerbindungstechnik 615 7$aTechnology: general issues 700 $aBlaß$b Hans JoachimUibel, Thomas$4auth$01291766 906 $aBOOK 912 $a9910346709103321 996 $aTragfähigkeit von stiftförmigen Verbindungsmitteln in Brettsperrholz$93038396 997 $aUNINA LEADER 05027nam 22008775 450 001 9910484834903321 005 20251226202338.0 010 $a3-540-85735-4 024 7 $a10.1007/978-3-540-85735-8 035 $a(CKB)1000000000491052 035 $a(SSID)ssj0000727458 035 $a(PQKBManifestationID)11426950 035 $a(PQKBTitleCode)TC0000727458 035 $a(PQKBWorkID)10688504 035 $a(PQKB)11387363 035 $a(DE-He213)978-3-540-85735-8 035 $a(MiAaPQ)EBC3063515 035 $a(MiAaPQ)EBC6511655 035 $a(Au-PeEL)EBL6511655 035 $a(OCoLC)1166298640 035 $a(PPN)128126345 035 $a(EXLCZ)991000000000491052 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust, Privacy and Security in Digital Business $e5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings /$fedited by Steven M. Furnell, Sokratis Katsikas, Antonio Lioy 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (X, 205 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5185 300 $aIncludes index. 311 08$a3-540-85734-6 320 $aIncludes bibliographical references and index. 327 $aInvited Lecture -- Biometrics ? How to Put to Use and How Not at All? -- Trust -- A Map of Trust between Trading Partners -- Implementation of a TCG-Based Trusted Computing in Mobile Device -- A Model for Trust Metrics Analysis -- Authentication, Authorization and Access Control -- Patterns and Pattern Diagrams for Access Control -- A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications -- A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony -- Reputation Systems -- Multilateral Secure Cross-Community Reputation Systems for Internet Communities -- Fairness Emergence through Simple Reputation -- Combining Trust and Reputation Management for Web-Based Services -- Security Policies and Identity Management -- Controlling Usage in Business Process Workflows through Fine-Grained Security Policies -- Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy -- BusiROLE: A Model for Integrating Business Roles into Identity Management -- Intrusion Detection and Applications of Game Theory to IT Security Problems -- The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset -- A Generic Intrusion Detection Game Model in IT Security -- On the Design Dilemma in Dining Cryptographer Networks -- Privacy -- Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing -- A User-Centric Protocol for Conditional Anonymity Revocation -- Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Trust and Privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008. The 18 revised full papers presented together with 1 invited keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on trust, authentication, authorization and access control, reputation systems, security policies and identity management, intrusion detection and applications of game theory to IT security problems, and privacy. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5185 606 $aComputers and civilization 606 $aElectronic data processing$xManagement 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aData protection 606 $aBusiness information services 606 $aComputers and Society 606 $aIT Operations 606 $aCryptology 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aIT in Business 615 0$aComputers and civilization. 615 0$aElectronic data processing$xManagement. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aData protection. 615 0$aBusiness information services. 615 14$aComputers and Society. 615 24$aIT Operations. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aIT in Business. 676 $a005.8 702 $aKatsikas$b Sokratis 702 $aLioy$b Antonio$f1958- 702 $aFurnell$b Steven$f1970- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484834903321 996 $aTrust, Privacy and Security in Digital Business$9772437 997 $aUNINA