9783642380037-3642380034-Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Security and Cryptology)

Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Security and Cryptology)

ISBN-13: 9783642380037
ISBN-10: 3642380034
Edition: 2013
Author: Audun Jøsang, Pierangela Samarati, Marinella Petrocchi
Publication date: 2013
Publisher: Springer
Format: Paperback 331 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783642380037
ISBN-10: 3642380034
Edition: 2013
Author: Audun Jøsang, Pierangela Samarati, Marinella Petrocchi
Publication date: 2013
Publisher: Springer
Format: Paperback 331 pages

Summary

Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Security and Cryptology) (ISBN-13: 9783642380037 and ISBN-10: 3642380034), written by authors Audun Jøsang, Pierangela Samarati, Marinella Petrocchi, was published by Springer in 2013. With an overall rating of 4.1 stars, it's a notable title among other books. You can easily purchase or rent Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Security and Cryptology) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book