000 01638nam a22003855a 4500
005 20250914164853.0
006 m d
007 cr nn 008maaau
008 090212s2006 gw q j eng d
020 _a9783540689638 (electronic bk.)
020 _a9783540689621 (paper)
035 _a(Springer)978-3-540-68962-1
039 9 _a200902121955
_bmuhaimin
_y04-04-2008
_zmuhaimin
050 0 0 _aQA76.9.A25
_bI5543 2006
082 0 0 _a005.8
_2220
090 _aQA76.9.A25
_bI61 2006
111 2 _aInternational Conference on Information Systems Security
_n(2nd :
_d2006 :
_cCalcutta, India)
245 1 0 _aInformation Systems Security (vol. # 4332)
_h[electronic resource] :
_bSecond International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings /
_cedited by Aditya Bagchi, Vijayalakshmi Atluri.
260 _aBerlin Heidelberg :
_bSpringer-Verlag GmbH.,
_c2006
300 _axv, 382 p. :
_bill., digital ;
_c24 cm.
440 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v4332
650 0 _aComputer security
_vcongresses.
650 0 _aComputers
_xAccess control
_vCongresses.
700 1 _aBagchi, Aditya.
700 1 _aAtluri, Vijayalakshmi.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer e-books
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://dx.doi.org/10.1007/11961635
907 _a.b14147506
_b2025-04-08
_c2019-11-12
942 _n0
_kQA76.9.A25 I61 2006
914 _avtls003372325
998 _ae
_b2008-04-04
_cm
_dz
_feng
_ggw
_y0
_z.b14147506
999 _c410730
_d410730