![9783642380037-3642380034-Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Security and Cryptology)](https://booksrun.com/image-loader/215/https:__m.media-amazon.com_images_I_31K67M7UFGL._SL500_.jpg)
Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Security and Cryptology)
ISBN-13:
9783642380037
ISBN-10:
3642380034
Edition:
2013
Author:
Audun Jøsang, Pierangela Samarati, Marinella Petrocchi
Publication date:
2013
Publisher:
Springer
Format:
Paperback
331 pages
FREE US shipping
Book details
ISBN-13:
9783642380037
ISBN-10:
3642380034
Edition:
2013
Author:
Audun Jøsang, Pierangela Samarati, Marinella Petrocchi
Publication date:
2013
Publisher:
Springer
Format:
Paperback
331 pages
Summary
Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Security and Cryptology) (ISBN-13: 9783642380037 and ISBN-10: 3642380034), written by authors
Audun Jøsang, Pierangela Samarati, Marinella Petrocchi, was published by Springer in 2013.
With an overall rating of 4.1 stars, it's a notable title among other
books. You can easily purchase or rent Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Security and Cryptology) (Paperback) from BooksRun,
along with many other new and used
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}