9783642224430-3642224431-Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Lecture Notes in Computer Science, 6710)

Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Lecture Notes in Computer Science, 6710)

ISBN-13: 9783642224430
ISBN-10: 3642224431
Edition: 2011
Author: Gilles Barthe, Javier Lopez, Alexander Pretschner, Jorge Cuellar
Publication date: 2011
Publisher: Springer
Format: Paperback 281 pages
FREE US shipping

Book details

ISBN-13: 9783642224430
ISBN-10: 3642224431
Edition: 2011
Author: Gilles Barthe, Javier Lopez, Alexander Pretschner, Jorge Cuellar
Publication date: 2011
Publisher: Springer
Format: Paperback 281 pages

Summary

Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Lecture Notes in Computer Science, 6710) (ISBN-13: 9783642224430 and ISBN-10: 3642224431), written by authors Gilles Barthe, Javier Lopez, Alexander Pretschner, Jorge Cuellar, was published by Springer in 2011. With an overall rating of 3.8 stars, it's a notable title among other books. You can easily purchase or rent Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Lecture Notes in Computer Science, 6710) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, S.T.M. 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, S.T.M. 2010 encouraged submissions discussing the application and deployment of security technologies in practice.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book