000796250 000__ 02891cam\a2200565Ii\4500 000796250 001__ 796250 000796250 005__ 20230306143538.0 000796250 006__ m\\\\\o\\d\\\\\\\\ 000796250 007__ cr\cnunnnunuuu 000796250 008__ 170714s2017\\\\sz\a\\\\o\\\\\101\0\eng\d 000796250 019__ $$a996413281 000796250 020__ $$a9783319611761$$q(electronic book) 000796250 020__ $$a3319611763$$q(electronic book) 000796250 020__ $$z9783319611754 000796250 0247_ $$a10.1007/978-3-319-61176-1$$2doi 000796250 035__ $$aSP(OCoLC)ocn993671094 000796250 035__ $$aSP(OCoLC)993671094$$z(OCoLC)996413281 000796250 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dAZU$$dOCLCF$$dUAB 000796250 049__ $$aISEA 000796250 050_4 $$aQA76.9.A25 000796250 08204 $$a005.8$$223 000796250 1112_ $$aAnnual IFIP WG 11.3 Working Conference on Data and Applications Security$$n(31st :$$d2017 :$$cPhiladelphia, Penn.) 000796250 24510 $$aData and applications security and privacy XXXI :$$b31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings /$$cGiovanni Livraga, Sencun Zhu (eds.). 000796250 2463_ $$aDBSec 2017 000796250 264_1 $$aCham, Switzerland :$$bSpringer,$$c2017. 000796250 300__ $$a1 online resource (xiii, 556 pages) :$$billustrations. 000796250 336__ $$atext$$btxt$$2rdacontent 000796250 337__ $$acomputer$$bc$$2rdamedia 000796250 338__ $$aonline resource$$bcr$$2rdacarrier 000796250 347__ $$atext file$$bPDF$$2rda 000796250 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v10359 000796250 4901_ $$aLNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI 000796250 500__ $$aInternational conference proceedings. 000796250 500__ $$aIncludes author index. 000796250 506__ $$aAccess limited to authorized users. 000796250 520__ $$aThis book constitutes the refereed proceedings of the 31st Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2017, held in Philadelphia, PA, USA, in July 2017. The 21 full papers and 9 short papers presented were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on access control, privacy, cloud security, secure storage in the cloud, secure systems, and security in networks and Web. 000796250 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 14, 2017). 000796250 650_0 $$aComputer security$$vCongresses. 000796250 650_0 $$aInternet$$xSecurity measures$$vCongresses. 000796250 650_0 $$aData protection$$vCongresses. 000796250 650_0 $$aDatabase security$$vCongresses. 000796250 7001_ $$aLivraga, Giovanni,$$eeditor. 000796250 7001_ $$aZhu, Sencun,$$eeditor. 000796250 77608 $$iPrint version:$$z9783319611754 000796250 830_0 $$aLecture notes in computer science ;$$v10359.$$x0302-9743 000796250 830_0 $$aLNCS sublibrary.$$nSL 3,$$pInformation systems and applications, incl. Internet/Web, and HCI. 000796250 852__ $$bebk 000796250 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-61176-1$$zOnline Access$$91397441.1 000796250 909CO $$ooai:library.usi.edu:796250$$pGLOBAL_SET 000796250 980__ $$aEBOOK 000796250 980__ $$aBIB 000796250 982__ $$aEbook 000796250 983__ $$aOnline 000796250 994__ $$a92$$bISE