This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012.
This book constitutes the refereed proceedings of the 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2006, held in Linz, Austria, in May/June 2010.
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013.
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014.
This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011.
Security Architecture (JDK1.2). http://java.sun.com/products/jdk/1.2/docs/guide/security/spec/securityspec.doc.html, October 2 1998. [Gon99] Li Gong. Inside Java 2 Platform Security -Architecture, API Design, and Implementation.
This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011.
... dummies. Wiley, Indianapolis (2008) 8. Fettke, P.: State-of-the-Art des State-of-the-Art. Eine Untersuchung der Forschungsmethode 'Review' innerhalb der Wirtschaftsinformatik. Wirtschaftsinformatik 48/4, 257–266 (2006) 9. Schlagheck, B ...