Trusted Information

The New Decade Challenge

  • Michel Dupuy
  • Pierre Paradinas

Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 65)

Table of contents

  1. Front Matter
    Pages i-xiv
  2. eSociety

    1. Dimitris Gritzalis, Kostantinos Moulinos, John Iliadis, Costas Lambrinoudakis, Steven Xarhoulacos
      Pages 1-17
    2. Kok Ming Ang, William J. Caelli
      Pages 19-34
    3. Claudia Eckert, Alexander Pircher
      Pages 35-50
  3. TTP Management and PKI

  4. Smart Card

  5. Security Protocols

    1. Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos
      Pages 109-121
    2. Annalisa De Bonis, Alfredo De Santis
      Pages 123-137
    3. Alban Gabillon, Jungsoo Byun
      Pages 139-149
    4. O. Pereira, J-J. Quisquater
      Pages 151-166
  6. Secure Workflow Environment

    1. Joon S. Park, Myong H. Kang, Judith N. Froscher
      Pages 167-181
    2. Thomas Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker
      Pages 183-198
    3. Konstantin Knorr, Henrik Stormer
      Pages 199-212
  7. Secure Group Communications

    1. Thomas Hardjono, Mark Baugher, Hugh Harney
      Pages 213-228
    2. Yongdae Kim, Adrian Perrig, Gene Tsudik
      Pages 229-244
  8. Security Policies

    1. Amgad Fayad, Sushil Jajodia, Don Faatz, Vinti Doshi
      Pages 245-260
    2. P. Bonatti, E. Damiani, S. De Capitani di Vimercati, P. Samarati
      Pages 261-276
  9. Risk Management

    1. Sungbaek Cho, Zbigniew Ciechanowicz
      Pages 277-292

About these proceedings

Introduction

Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec’01 is the first of this decade (and century) and it will be devoted to “Trusted Information - the New Decade Challenge” This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management. The year 2001 is a double anniversary. First, fifteen years ago, the first IFIP/Sec was held in France (IFIP/Sec’86, Monte-Carlo) and 2001 is also the anniversary of smart card technology. Smart cards emerged some twenty years ago as an innovation and have now become pervasive information devices used for highly distributed secure applications. These cards let millions of people carry a highly secure device that can represent them on a variety of networks. To conclude, we hope that the rich “menu” of conference papers for this IFIP/Sec conference will provide valuable insights and encourage specialists to pursue their work in trusted information.

Keywords

Analysis Audit B2B E-Commerce IT security communication cryptography data security distributed systems information information processing information system management modeling

Editors and affiliations

  • Michel Dupuy
    • 1
  • Pierre Paradinas
    • 2
  1. 1.SGDN/DCSSI/CERTAFrance
  2. 2.Gemplus LabsFrance

Bibliographic information

  • DOI https://doi.org/10.1007/b116847
  • Copyright Information IFIP International Federation for Information Processing 2001
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-0-7923-7389-6
  • Online ISBN 978-0-306-46998-5
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • About this book
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Electronics
Telecommunications
Consumer Packaged Goods