|
|
|
|
LEADER |
03654nam a22006135i 4500 |
001 |
978-3-030-81242-3 |
003 |
DE-He213 |
005 |
20210714082244.0 |
007 |
cr nn 008mamaa |
008 |
210714s2021 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030812423
|9 978-3-030-81242-3
|
024 |
7 |
|
|a 10.1007/978-3-030-81242-3
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Data and Applications Security and Privacy XXXV
|h [electronic resource] :
|b 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19–20, 2021, Proceedings /
|c edited by Ken Barker, Kambiz Ghazinour.
|
250 |
|
|
|a 1st ed. 2021.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2021.
|
300 |
|
|
|a XI, 408 p. 128 illus., 73 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 12840
|
505 |
0 |
|
|a Differential Privacy -- Cryptology I -- Cryptology II -- Machine Learning -- Potpourri I -- Potpourri II -- Access Control.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2021, held in Calgary, Canada, in July 2021.* The 15 full papers and 8 short papers presented were carefully reviewed and selected from 45 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named differential privacy, cryptology, machine learning, access control and others. *The conference was held virtually due to the COVID-19 pandemic.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Machine learning.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cryptology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I18040
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I18030
|
650 |
2 |
4 |
|a Machine Learning.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I21010
|
700 |
1 |
|
|a Barker, Ken.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Ghazinour, Kambiz.
|e editor.
|0 (orcid)0000-0002-6816-2968
|1 https://orcid.org/0000-0002-6816-2968
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030812416
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030812430
|
830 |
|
0 |
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 12840
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-81242-3
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|