LEADER 03490nam 22007095 450 001 996465545503316 005 20200702011305.0 010 $a3-319-68063-3 024 7 $a10.1007/978-3-319-68063-7 035 $a(CKB)4100000000587179 035 $a(DE-He213)978-3-319-68063-7 035 $a(MiAaPQ)EBC6287287 035 $a(MiAaPQ)EBC5576627 035 $a(Au-PeEL)EBL5576627 035 $a(OCoLC)1004511215 035 $a(PPN)204533961 035 $a(EXLCZ)994100000000587179 100 $a20170913d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Trust Management$b[electronic resource] $e13th International Workshop, STM 2017, Oslo, Norway, September 14?15, 2017, Proceedings /$fedited by Giovanni Livraga, Chris Mitchell 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (X, 235 p. 66 illus.) 225 1 $aSecurity and Cryptology ;$v10547 311 $a3-319-68062-5 327 $aCryptosystems and Applied Cryptography -- Software Security and Risk Management -- Authorization -- Security Vulnerabilities and Protocols -- Secure Systems. 330 $aThis book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. The 10 full papers and 6 short papers were carefully reviewed and selected from 33 submissions. The focus of the workshop was on the following topics: cryptosystems and applied cryptography; software security and risk management; authorization; security vulnerabilities and protocols; and secure systems. 410 0$aSecurity and Cryptology ;$v10547 606 $aComputer security 606 $aApplication software 606 $aSoftware engineering 606 $aComputer communication systems 606 $aComputers 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 615 0$aComputer security. 615 0$aApplication software. 615 0$aSoftware engineering. 615 0$aComputer communication systems. 615 0$aComputers. 615 14$aSystems and Data Security. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aComputing Milieux. 676 $a005.8 702 $aLivraga$b Giovanni$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMitchell$b Chris$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465545503316 996 $aSecurity and Trust Management$92214293 997 $aUNISA