![9783642224430-3642224431-Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Lecture Notes in Computer Science, 6710)](https://booksrun.com/image-loader/215/https:__m.media-amazon.com_images_I_31f+jU2l2ZL._SL500_.jpg)
Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Lecture Notes in Computer Science, 6710)
ISBN-13:
9783642224430
ISBN-10:
3642224431
Edition:
2011
Author:
Gilles Barthe, Javier Lopez, Alexander Pretschner, Jorge Cuellar
Publication date:
2011
Publisher:
Springer
Format:
Paperback
281 pages
FREE US shipping
Book details
ISBN-13:
9783642224430
ISBN-10:
3642224431
Edition:
2011
Author:
Gilles Barthe, Javier Lopez, Alexander Pretschner, Jorge Cuellar
Publication date:
2011
Publisher:
Springer
Format:
Paperback
281 pages
Summary
Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Lecture Notes in Computer Science, 6710) (ISBN-13: 9783642224430 and ISBN-10: 3642224431), written by authors
Gilles Barthe, Javier Lopez, Alexander Pretschner, Jorge Cuellar, was published by Springer in 2011.
With an overall rating of 3.8 stars, it's a notable title among other
books. You can easily purchase or rent Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Lecture Notes in Computer Science, 6710) (Paperback) from BooksRun,
along with many other new and used
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, S.T.M. 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, S.T.M. 2010 encouraged submissions discussing the application and deployment of security technologies in practice.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}