LEADER 04127nam 22008295 450 001 996208604303316 005 20200704021616.0 010 $a3-319-17127-5 024 7 $a10.1007/978-3-319-17127-2 035 $a(CKB)3710000000404058 035 $a(SSID)ssj0001501702 035 $a(PQKBManifestationID)11896740 035 $a(PQKBTitleCode)TC0001501702 035 $a(PQKBWorkID)11446592 035 $a(PQKB)10462275 035 $a(DE-He213)978-3-319-17127-2 035 $a(MiAaPQ)EBC5594710 035 $a(PPN)185489001 035 $a(EXLCZ)993710000000404058 100 $a20150427d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRisks and Security of Internet and Systems$b[electronic resource] $e9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers /$fedited by Javier Lopez, Indrajit Ray, Bruno Crispo 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XI, 275 p. 70 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8924 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-17126-7 327 $aTrust -- Security risks and threats -- Intrusion detection and prevention -- Access control and security modeling. 330 $aThis book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8924 606 $aComputer security 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aSoftware engineering 606 $aApplication software 606 $aData encryption (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aSoftware engineering. 615 0$aApplication software. 615 0$aData encryption (Computer science). 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aSoftware Engineering. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCryptology. 676 $a004.678 702 $aLopez$b Javier$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRay$b Indrajit$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCrispo$b Bruno$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996208604303316 996 $aRisks and Security of Internet and Systems$92102247 997 $aUNISA