000845735 000__ 02521cam\a2200517Mi\4500 000845735 001__ 845735 000845735 005__ 20230306145034.0 000845735 006__ m\\\\\o\\d\\\\\\\\ 000845735 007__ cr\nn\nnnunnun 000845735 008__ 180726s2018\\\\gw\\\\\\o\\\\\000\0\eng\d 000845735 019__ $$a1048931703$$a1054328434 000845735 020__ $$a9783319983851 000845735 020__ $$a3319983857 000845735 020__ $$z9783319983844 000845735 0247_ $$a10.1007/978-3-319-98385-1$$2doi 000845735 035__ $$aSP(OCoLC)on1049852170 000845735 035__ $$aSP(OCoLC)1049852170$$z(OCoLC)1048931703$$z(OCoLC)1054328434 000845735 040__ $$aUCW$$beng$$cUCW$$dOCLCO$$dGW5XE$$dUAB 000845735 049__ $$aISEA 000845735 050_4 $$aQA76.9.A25 000845735 08204 $$a005.8$$223 000845735 24500 $$aTrust, Privacy and Security in Digital Business :$$b15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedings /$$cedited by Steven Furnell, Haralambos Mouratidis, Günther Pernul. 000845735 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2018. 000845735 300__ $$a1 online resource (x, 261 pages) :$$billustrations. 000845735 336__ $$atext$$btxt$$2rdacontent 000845735 337__ $$acomputer$$bc$$2rdamedia 000845735 338__ $$aonline resource$$bcr$$2rdacarrier 000845735 347__ $$atext file$$bPDF$$2rda 000845735 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v11033 000845735 5050_ $$aPermission Models and Cloud -- Privacy -- Proactive Security Measures -- Cyber Physical Systems. 000845735 506__ $$aAccess limited to authorized users. 000845735 520__ $$aThis book constitutes the refereed proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2018, held in Regensburg, Germany, in September 2018 in conjunction with DEXA 2018. The 15 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: Permission models and cloud, privacy, proactive security measures, and cyber physical systems. 000845735 650_0 $$aComputer science. 000845735 650_0 $$aComputer networks. 000845735 650_0 $$aComputer security. 000845735 650_0 $$aData encryption (Computer science) 000845735 650_0 $$aComputers and civilization. 000845735 7001_ $$aFurnell, Steven.$$eeditor. 000845735 7001_ $$aMouratidis, Haralambos.$$eeditor. 000845735 7001_ $$aPernul, Günther.$$eeditor. 000845735 77608 $$iPrint version: $$z9783319983844 000845735 830_0 $$aLecture notes in computer science ;$$v11033. 000845735 852__ $$bebk 000845735 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-98385-1$$zOnline Access$$91397441.1 000845735 909CO $$ooai:library.usi.edu:845735$$pGLOBAL_SET 000845735 980__ $$aEBOOK 000845735 980__ $$aBIB 000845735 982__ $$aEbook 000845735 983__ $$aOnline 000845735 994__ $$a92$$bISE