LEADER 04045nam 22008295 450 001 996466255103316 005 20200701104333.0 010 $a3-642-39256-3 024 7 $a10.1007/978-3-642-39256-6 035 $a(CKB)3710000000002618 035 $a(DE-He213)978-3-642-39256-6 035 $a(SSID)ssj0000962637 035 $a(PQKBManifestationID)11519818 035 $a(PQKBTitleCode)TC0000962637 035 $a(PQKBWorkID)10976308 035 $a(PQKB)11610320 035 $a(MiAaPQ)EBC3101207 035 $a(PPN)172427940 035 $a(EXLCZ)993710000000002618 100 $a20130710d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData and Applications Security and Privacy XXVII$b[electronic resource] $e27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings /$fedited by Lingyu Wang, Basit Shafiq 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XIV, 305 p. 71 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v7964 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-39255-5 320 $aIncludes bibliographical references and index. 327 $aPrivacy -- Access control -- Cloud computing -- Data outsourcing -- Mobile computing. 330 $aThis book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v7964 606 $aComputer security 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aApplication software 606 $aData mining 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aData mining. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aData Mining and Knowledge Discovery. 676 $a005.8 702 $aWang$b Lingyu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShafiq$b Basit$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466255103316 996 $aData and Applications Security and Privacy XXVII$92830977 997 $aUNISA