© 2005

Certification and Security in Inter-Organizational E-Service

  • Editors
  • Enrico Nardelli
  • Maurizio Talamo
  • Presents the most current research in the field of certification, authentication and computer security

Conference proceedings IFIP WCC TC11 2004

Part of the IFIP On-Line Library in Computer Science book series (IFIPAICT, volume 177)

Table of contents

  1. Front Matter
    Pages i-4
  2. Franco Arcieri, Mario Ciclosi, Andrea Dimitri, Fabio Fioravanti, Enrico Nardelli, Maurizio Talamo
    Pages 5-18
  3. Almut Herzog, Nahid Shahmehri
    Pages 19-32
  4. Benjamin Tobler, Andrew C. M. Hutchison
    Pages 33-53
  5. Matt Barrett, Clark Thomborson
    Pages 55-74
  6. Tadasuke Nakagawa, Shigeyuki Tani, Chizuko Yasunobu, Norihisa Komoda
    Pages 85-90
  7. Vincenzo Auletta, Carlo Blundo, Stelvio Cimato, Guerriero Raimato
    Pages 91-100
  8. Giovanna Melideo, Guido Proietti
    Pages 101-112
  9. Jan Muntermann, Heiko Roßnagel, Jan Muntermann, Kai Rannenberg
    Pages 129-139
  10. Jong-Gook Ko, Ki-Young Kim, Keul-Woo Ryu
    Pages 141-149

About these proceedings


International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.


For more information about the 300 other books in the IFIP series, please visit



IT enabled Government operations Monitor communication e-services firewall game theory identity cards mobile commerce network intrusion detection organization risk analysis secure execution environment security security protocol untrusted code

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking