Advertisement

Information Security for Global Information Infrastructures

IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China

  • Sihan Qing
  • Jan H. P. Eloff
Conference proceedings SEC 2000

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 47)

Table of contents

  1. Front Matter
    Pages i-xv
  2. Reviewed Papers

    1. Front Matter
      Pages xv-xv
    2. Kai Rannenberg
      Pages 1-10
    3. M. M. Eloff, S. H. Von Solms
      Pages 11-18
    4. Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis
      Pages 37-47
    5. E. Von Solms, S. H. Von Solms
      Pages 59-68
    6. Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng
      Pages 69-78
    7. Wolfgang Essmayr, Edgar Weippl
      Pages 79-88
    8. Herbert Leitold, Peter Lipp, Andreas Sterbenz
      Pages 89-98
    9. Costas Lambrinoudakis
      Pages 131-140
    10. A. Liebenberg, J. H. P. Eloff
      Pages 141-150
    11. S. Dawson, S. De Capitani di Vimercati, P. Lincoln, P. Samarati
      Pages 151-160
    12. Jiahai Yang, Peng Ning, X. Sean Wang, Sushil Jajodia
      Pages 171-180
    13. Petar Horvatic, Jian Zhao, Niels J. Thorwirth
      Pages 181-190
    14. Wenling Wu, Dengguo Feng, Sihan Qing
      Pages 201-209
    15. Mingsheng Wang, Sihan Qi, Denguo Feng
      Pages 211-220
    16. Claudia Eckert, Florian Erhard, Johannes Geiger
      Pages 221-230
    17. Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl Christian Posch, Reinhard Posch, Johannes Wolkerstorfer
      Pages 231-240
    18. Jinhui Chao, Kazuto Matsuo, Shigeo Tsujii
      Pages 241-250
    19. Haizhi Xu, Changwei Cui, Ying Lin, Tiejian Luo, Zhanqiu Dong
      Pages 261-270
    20. Steve Kremer, Olivier Markowitch
      Pages 271-280
    21. Shaoquan Jiang, Dengguo Feng, Sihan Qing
      Pages 281-290
    22. Jussipekka Leiwo, Thomas Aura, Pekka Nikander
      Pages 301-310
    23. Rosanna Y. Chan, Jonathan C. Wong, Alex C. Chan
      Pages 321-330
    24. D. G. Cholewka, R. A. Botha, J. H. P. Eloff
      Pages 341-350
    25. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati
      Pages 351-360
    26. Gregory Neven, Frank Piessens, Bart De Decker
      Pages 361-370
    27. M. Hitchens, V. Varadharajan
      Pages 371-380
    28. J. Leiwo, C. Hänle, P. Homburg, A. S. Tanenbaum
      Pages 381-390
    29. M. J. Warren, W. Hutchinson
      Pages 411-420
    30. Frans Lategan, Martin S. Olivier
      Pages 421-430
    31. L. Labuschagne
      Pages 441-450
    32. Feng Bao, Robert Deng, Jianying Zhou
      Pages 451-460
    33. Fangguo Zhang, Futai Zhang, Yumin Wang
      Pages 461-470
    34. A. H. W. Chan, K. M. Wong, T. Y. Wong, M. R. Lyu
      Pages 471-480

About these proceedings

Introduction

IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings.

Keywords

Audit Auditor Denial of Service E-Commerce IT security Mapping algorithms communication computer science computer security distributed computing distributed systems information modeling network security

Editors and affiliations

  • Sihan Qing
    • 1
  • Jan H. P. Eloff
    • 2
  1. 1.Engineering Research Center for Information Security TechnologyChinese Academy of SciencesChina
  2. 2.Rand Afrikaans UniversitySouth Africa

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-35515-3
  • Copyright Information IFIP International Federation for Information Processing 2000
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4757-5479-7
  • Online ISBN 978-0-387-35515-3
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site
Industry Sectors
Automotive
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering