*00113100
*00520250613104300.0
*007ta
*008090617s2004 gw 100 u eng d
*00902000cam a2200433 c 4500
*019 $bl
*020 $a3540213120$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990409619664702201
*035 $a(NO-LaBS)14191214(bibid)
*035 $a(NO-TrBIB)040961966
*035 $a040961966-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a004.3.052
*084 $aC.2.4$2acmccs
*084 $aK.6.5$2acmccs
*084 $aL 1602$qNoOU$2utklklass
*1112 $aiTrust 2004$0(NO-TrBIB)4087109$_14102500
*24510$aTrust management :$bsecond international conference, iTrust 2004, Oxford, UK, March 29-April 1, 2004 : proceedings$cChristian Jensen, Stefan Poslad, Theo Dimitrakos (eds.)
*260 $aBerlin$bSpringer$cc2004
*300 $aXIII, 375 s.$bill.
*4901 $aLecture notes in computer science$v2995
*650 7$aAutentisering$0(NO-TrBIB)REAL005159$2noubomn$_203799700
*650 7$aDatamaskiner$xPålitelighet$2tekord$vKongresser$_191317700
*650 7$aDistribuerte systemer$0(NO-TrBIB)REAL003034$2noubomn$_192651000
*650 7$aTillit$2tekord$_222992800
*653 $atillit$ainformasjonsteknologi$_14102900
*7001 $aDimitrakos, Theo$0(NO-TrBIB)4087107$_14103000
*7001 $aJensen, Christian D.$0(NO-TrBIB)99040835$_14103100
*7001 $aPoslad, Stefan$0(NO-TrBIB)4087108$_14103200
*7760 $tiTrust 2004$w990420335274702201
*830 0$aLecture notes in computer science$v2995$_13074400
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=3540213120
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540213123
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540213123
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/3/2/9783540213123.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/0/2/3540213120.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/3/2/9783540213123.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:990409619664702202$b2021-11-14T19:40:22Z$z990409619664702202
^