It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 06306cam 2200673Mi 4500
001 ocn812654650
003 OCoLC
005 20201017031416.0
008 970210e199706uucau o 000 0 eng d
006 m o d
007 cr |n|||||||||
040 $aCOO$beng$epn$cCOO$dOCLCQ$dIAS$dLIP$dCEF$dVT2$dWYU$dLVT$dOCLCO$dHS0$dUWK$dOCLCQ$dERF$dUKBTH$dUHL$dOCL$dUKSSU$dSNU$dUK7LJ$dLDP$dEQF$dSXB
019 $a990465607$a1108971330$a1110223401$a1112524342$a1113508077$a1113780362$a1120865374$a1127143605$a1154964087$a1154982780$a1155942771$a1156906568$a1164883714$a1165977824$a1166142405$a1166164308$a1167364292$a1172049562$a1179598788$a1179767794$a1180637692
020 $a9780818678288
020 $a0818678283$q(Trade Paper)
024 3 $a9780818678288
035 $a(OCoLC)812654650$z(OCoLC)990465607$z(OCoLC)1108971330$z(OCoLC)1110223401$z(OCoLC)1112524342$z(OCoLC)1113508077$z(OCoLC)1113780362$z(OCoLC)1120865374$z(OCoLC)1127143605$z(OCoLC)1154964087$z(OCoLC)1154982780$z(OCoLC)1155942771$z(OCoLC)1156906568$z(OCoLC)1164883714$z(OCoLC)1165977824$z(OCoLC)1166142405$z(OCoLC)1166164308$z(OCoLC)1167364292$z(OCoLC)1172049562$z(OCoLC)1179598788$z(OCoLC)1179767794$z(OCoLC)1180637692
037 $b00029433
245 00 $aSecurity and Privacy, 1997 :$bProceedings, IEEE Symposium on Security and Privacy (1997: Oakland, CA).
260 $aLos Alamitos :$bIEEE Computer Society Press,$cJune 1997.
300 $a1 online resource (250 pages)
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
520 8 $aThree brief summaries of panel discussions and 28 papers cover the trusted computing base model, authorization and authentication, applications, security theory, ensuring assurance in mobile computing, architecture, intrusion detection and beyond, security in innovative new operating systems, and system vulnerability. Among specific topics are some weaknesses of the trusted computing base model, acceptable metrics of authentication, anonymous connections and onion routing, secure software architectures, local enforcement for global policies, surviving information warfare attacks on databases, research on proof- carrying code for untrusted-code security, and the possibility of evasive electronic espionage by deniable password snatching. No subject index. Annotation copyrighted by Book News, Inc., Portland, OR.
546 $aEnglish.
650 0 $aComputers$xAccess control$vCongresses.
650 0 $aData protection$vCongresses.
650 0 $aPrivacy, Right of$vCongresses.
650 0 $aTelecommunication$xSecurity measures$vCongresses.
650 7 $aComputers$xAccess control.$2fast$0(OCoLC)fst00872779
650 7 $aData protection.$2fast$0(OCoLC)fst00887958
650 7 $aPrivacy, Right of.$2fast$0(OCoLC)fst01077444
650 7 $aTelecommunication$xSecurity measures.$2fast$0(OCoLC)fst01145928
655 7 $aConference papers and proceedings.$2fast$0(OCoLC)fst01423772
655 4 $aElectronic books.
773 0 $w(CKB)111056645870036$w(OCoLC)62141339
776 08 $iPrint version:$tSecurity and Privacy, 1997.$dLos Alamitos : IEEE Computer Society Press, June 1997$w(DLC) 10816011
856 40 $3IEEE Xplore$uhttp://ieeexplore.ieee.org/servlet/opac?punumber=4693
856 40 $3IEEE Xplore$uhttps://ieeexplore.ieee.org/servlet/opac?punumber=4693
856 40 $uhttp://VH7QX3XE2P.search.serialssolutions.com/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0000558789&T=marc&tab=BOOKS
856 4 $uhttp://pmt-eu.hosted.exlibrisgroup.com/openurl/44OPN_INST/44OPN_services_page?u.ignore_date_coverage=true&rft.mms_id=9952384502902316$zIEEE/IET Electronic Library (IEL) Conference Proceedings$p5367404640002316
856 4 $b5396646040002418$uhttp://whel-primo.hosted.exlibrisgroup.com/openurl/44WHELF_ABW/44WHELF_ABW_VU1?u.ignore_date_coverage=true&rft.mms_id=9912037295202418$cIEEE Xplore$cIEEE/IET Electronic Library (IEL)$p5396646040002418
856 $uhttps://discover.gcu.ac.uk/discovery/openurl?institution=44GLCU_INST&vid=44GLCU_INST:44GLCU_VU2&?u.ignore_date_coverage=true&rft.mms_id=991002467181903836$p5364049640003836$xStGlGCU
856 $uhttps://openurl.ac.uk/ukfed:bat?u.ignore_date_coverage=true&rft.mms_id=991003536639202761$p5341389700002761
856 $uhttps://shu-primo.hosted.exlibrisgroup.com/openurl/44SHU/44SHU_VU1?u.ignore_date_coverage=true&rft.mms_id=9965816902501$zIEEE/IET Electronic Library (IEL)$p5357731230002501
856 $uhttp://imp-primo.hosted.exlibrisgroup.com/openurl/44IMP/44IMP_services_page?u.ignore_date_coverage=true&rft.mms_id=999134580001591$p5350787730001591
856 40 $uhttps://catalogue.solent.ac.uk/openurl/44SSU_INST/44SSU_INST:VU1?u.ignore_date_coverage=true&rft.mms_id=9997005794604796$zIEEE Xplore$aAvailable$p5324984930004796$xUKSoSU
856 $b5352273020002417$uhttp://eu.alma.exlibrisgroup.com/view/uresolver/44WHELF_SWA/openurl?u.ignore_date_coverage=true&rft.mms_id=998177641402417$cIEEE Xplore$cIEEE/IET Electronic Library (IEL) Conference Proceedings$p5352273020002417$xWlSwUW
856 $uhttps://ljmu-primo.hosted.exlibrisgroup.com/openurl/44JMU/44JMU_services_page?u.ignore_date_coverage=true&rft.mms_id=9911251499903826$p5372625140003826$xUkLiJM
856 $uhttps://library-collections-search.westminster.ac.uk/openurl/44WST_INST/44WST_INST:WST_VUA?u.ignore_date_coverage=true&rft.mms_id=996815030003711$zIEEE/IET Electronic Library (IEL)$p5332186700003711$xUkLoUW
856 $uhttps://whel-primo.hosted.exlibrisgroup.com/openurl/44WHELF_BANG/44WHELF_BANG_services_page?u.ignore_date_coverage=true&rft.mms_id=991004841390102422$p53124604570002422$xWlBaU$xAvailable
856 $b5396646040002418$uhttp://whel-primo.hosted.exlibrisgroup.com/openurl/44WHELF_ABW/44WHELF_ABW_services?u.ignore_date_coverage=true&rft.mms_id=9912037295202418$cIEEE Xplore$cIEEE/IET Electronic Library (IEL)$p5396646040002418$xWlAbUW
856 $uhttps://birmingham-primo.hosted.exlibrisgroup.com/openurl/44BIR/44BIR_VU1?u.ignore_date_coverage=true&rft.mms_id=9933488671804871$zIEEE/IET Electronic Library (IEL) Conference Proceedings$p53129713240004871$xUkBU
029 1 $aAU@$b000051524611
029 1 $aAU@$b000061118754
029 1 $aGBVCP$b894506676
994 $aZ0$bP4A
948 $hHELD BY P4A - 227 OTHER HOLDINGS