LEADER 02254nam 2200709 a 450 001 9910464135103321 005 20210114061809.0 010 $a1-61249-219-3 035 $a(CKB)3170000000046474 035 $a(OCoLC)803372397 035 $a(CaPaEBR)ebrary10580382 035 $a(SSID)ssj0000600839 035 $a(PQKBManifestationID)11344578 035 $a(PQKBTitleCode)TC0000600839 035 $a(PQKBWorkID)10600483 035 $a(PQKB)11245565 035 $a(MiAaPQ)EBC3119341 035 $a(EXLCZ)993170000000046474 100 $a20150424d2012|||| s|| | 101 0 $aeng 181 $ctxt 182 $cc 183 $acr 200 10$aMidwest Farmer's Daughter : In Search of an American Icon$b[electronic resource] 210 $aAshland, OH, USA$cPurdue University Press$d20120701 210 $cPurdue University Press 215 $a1 online resource (279 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-55753-619-8 606 $aSOCIAL SCIENCE$2bisac 606 $aWomen's Studies$2bisac 606 $aWomen farmers$xPublic opinion$zMiddle West 606 $aFarm life$xPublic opinion$zMiddle West 606 $aWomen farmers$zMiddle West 606 $aFarm life$zMiddle West 606 $aWomen in mass media$zUnited States 606 $aFarm life in mass media$zUnited States 606 $aPopular culture 606 $aPublic opinion 606 $aAgriculture$2HILCC 606 $aEarth & Environmental Sciences$2HILCC 606 $aAgriculture - General$2HILCC 615 7$aSOCIAL SCIENCE 615 7$aWomen's Studies 615 0$aWomen farmers$xPublic opinion 615 0$aFarm life$xPublic opinion 615 0$aWomen farmers 615 0$aFarm life 615 0$aWomen in mass media 615 0$aFarm life in mass media 615 0$aPopular culture 615 0$aPublic opinion 615 7$aAgriculture 615 7$aEarth & Environmental Sciences 615 7$aAgriculture - General 676 $a630.82 700 $aJack$b Zachary Michael$0872390 801 0$bPQKB 906 $aBOOK 912 $a9910464135103321 996 $aMidwest Farmer's Daughter : In Search of an American Icon$91947666 997 $aUNINA LEADER 01461nam 2200385 a 450 001 9910701017303321 005 20111013142901.0 035 $a(CKB)5470000002414868 035 $a(OCoLC)756860999 035 $a(EXLCZ)995470000002414868 100 $a20111013d2011 ua 0 101 0 $aeng 135 $aurbn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCompact of free association$b[electronic resource] $etrust fund : agreement between the United States of America and the Marshall Islands; signed at Majuro, April 30, 2003 210 1$a[Washington, D.C.] :$cU.S. Dept. of State,$d[2011?] 215 $a1 online resource (27 unnumbered pages) 225 1 $aTreaties and other international acts series ;$v04-501.5 300 $aTitle from title screen (viewed on Oct. 13, 2011). 517 $aCompact of free association 606 $aTrusts and trustees$zMarshall Islands 606 $aEconomic assistance, American$zMarshall Islands 607 $aMarshall Islands$xForeign economic relations$zUnited States 607 $aUnited States$xForeign economic relations$zMarshall Islands 615 0$aTrusts and trustees 615 0$aEconomic assistance, American 712 02$aUnited States.$bDepartment of State. 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910701017303321 996 $aCompact of Free Association$93155906 997 $aUNINA LEADER 04544nam 22007335 450 001 9910741159103321 005 20251226203645.0 010 $a3-642-38004-2 024 7 $a10.1007/978-3-642-38004-4 035 $a(CKB)3280000000007617 035 $a(DE-He213)978-3-642-38004-4 035 $a(SSID)ssj0001071242 035 $a(PQKBManifestationID)11586467 035 $a(PQKBTitleCode)TC0001071242 035 $a(PQKBWorkID)11102921 035 $a(PQKB)10813256 035 $a(MiAaPQ)EBC3093077 035 $a(PPN)16914075X 035 $a(EXLCZ)993280000000007617 100 $a20130423d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Trust Management $e8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers /$fedited by Audun Jøsang, Pierangela Samarati, Marinella Petrocchi 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (X, 321 p. 74 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v7783 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-38003-4 327 $aPolicy Enforcement and Monitoring -- Cost-Aware Runtime Enforcement of Security Policies -- Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors -- Lazy Security Controllers -- Access Control -- Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities -- Labeled Goal-Directed Search in Access Control Logic -- A Use-Based Approach for Enhancing UCON -- Analysis of Communicating Authorization Policies -- Trust, Reputation, and Privacy Building Trust and Reputation In: A Development Framework for Trust Models Implementation -- Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures -- Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy -- Distributed Systems and Physical Security -- Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification -- DOT-COM: Decentralized Online Trading and COMmerce -- Formalizing Physical Security Procedures -- Authentication -- A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items -- Authenticating Email Search Results -- Software Authentication to Enhance Trust in Body Sensor Networks -- YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM -- Security Policies -- Boosting Model Checking to Analyse Large ARBAC Policies -- Constrained Role Mining -- A Datalog Semantics for Paralocks. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v7783 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science 606 $aData and Information Security 606 $aIT Operations 606 $aCryptology 606 $aComputer Science 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science. 615 14$aData and Information Security. 615 24$aIT Operations. 615 24$aCryptology. 615 24$aComputer Science. 676 $a004 702 $aJøsang$b Audun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSamarati$b Pierangela$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPetrocchi$b Marinella$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910741159103321 996 $aSecurity and Trust Management$93590338 997 $aUNINA