Engineering secure software and systems [electronic resource] : 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings / edited by Frank Piessens, Juan Caballero, Nataliia Bielova.
2015
QA76.9.A25 E77 2015eb
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Cite
Citation
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Engineering secure software and systems [electronic resource] : 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings / edited by Frank Piessens, Juan Caballero, Nataliia Bielova.
Meeting Name
ISBN
9783319156187 electronic book
3319156187 electronic book
9783319156170
3319156187 electronic book
9783319156170
Published
Cham : Springer, 2015.
Language
English
Description
1 online resource (xii, 227 pages) : illustrations.
Item Number
10.1007/978-3-319-15618-7 doi
Call Number
QA76.9.A25 E77 2015eb
Dewey Decimal Classification
005.8
Summary
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measurements ontologies; and access control.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed March 5, 2015).
Series
Lecture notes in computer science ; 8978.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Print version: 9783319156170
Linked Resources
Record Appears in
Table of Contents
Formal methods
Cloud passwords
Machine learning
Measurements ontologies
Access control.
Cloud passwords
Machine learning
Measurements ontologies
Access control.