Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000: Athens, Greece November 1 - 4, 2000
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
ACM Press
2000
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XII, 255 S. graph. Darst. |
ISBN: | 1581132034 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV013524596 | ||
003 | DE-604 | ||
005 | 20110331 | ||
007 | t | ||
008 | 010111s2000 d||| |||| 10||| eng d | ||
020 | |a 1581132034 |9 1-58113-203-4 | ||
035 | |a (OCoLC)632752293 | ||
035 | |a (DE-599)BVBBV013524596 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-20 |a DE-83 |a DE-11 |a DE-706 | ||
084 | |a SS 2000 |0 (DE-625)143437: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 600f |2 stub | ||
111 | 2 | |a Conference on Computer and Communications Security |n 7 |d 2000 |c Athen |j Verfasser |0 (DE-588)1704268-9 |4 aut | |
245 | 1 | 0 | |a Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000 |b Athens, Greece November 1 - 4, 2000 |c ed. by: Sushil Jajodia ... |
246 | 1 | 3 | |a Seventh ACM Conference on Computer and Communications Security |
264 | 1 | |a New York, NY |b ACM Press |c 2000 | |
300 | |a XII, 255 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2000 |z Athen |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Jajodia, Sushil |d 1947- |0 (DE-588)120551683 |4 edt | |
710 | 2 | |a Association for Computing Machinery |e Sonstige |0 (DE-588)1222-1 |4 oth | |
856 | 4 | 2 | |m Digitalisierung TU Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009231664&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-009231664 |
Datensatz im Suchindex
_version_ | 1804128317251518464 |
---|---|
adam_text | Table
of
Contents
Symposium
Committee
.......................................................................................................................
viii
Steering Committee
.............................................................................................................................viii
Local Organizing Committee
..............................................................................................................viii
Local Host and Co-Organizers
...........................................................................................................viii
Program Committee
...............................................................................................................................ix
External Reviewers
................................................................................................................................ix
Tutorial
1 :
Network Security and
IPsec
...............................................................................................xi
J.
Ioannidis (AT&T) and A. Keromytis (University of Pennsylvania)
Tutorial
2:
Electronic Payment Technologies
....................................................................................xii
Y. Frenkel (eCash Technologies)
Session
2-1 :
Certificate Management
Session Chair: S. Stubblebine
Evaluating Certificate Status Information Mechanisms
.......................................................1
J. Iliadis, D. Spinellis, S. Katsikas (University of the Aegean),
D. Gritzalis (Athens University of Economics
&
Business), and B. Preneel
(Universiteit Leuven)
Accountable Certificate Management using Undeniable Attestations
...............................9
A. Buidas (Küberneetika
AS), P. Laud
(Universität des Saarlandes),
and
H. Lipmaa
(Helsinki University of Technology)
Efficient Fault-Tolerant Certificate Revocation
...................................................................19
R. Wright (AT&TLabs-Research), P. Lincoln andJ. Millen (SRIInternational)
Session
2-2:
Privacy and Anonymity
Session Chair: R. Wright
Timing Attacks on Web Privacy
............................................................................................25
E. W.
Feiten
and M. A. Schneider (Princeton University)
A Protocol for Anonymous Communication Over the Internet
..........................................33
C. Shields (Purdue University) and B.
N.
Levine
(University of Massachusetts)
A Secure Execution Framework for Java
.............................................................................43
M. Hauswirth,
С
Kerer, and R. Kurmanowytsch (Technical University of Vienna)
User Privacy Issues Regarding Certificates and the TLS Protocol
(The Design and Implementation of the SPSL Protocol)
....................................................53
P.
Persiano
and I.
Visconti
(Università degli studi di
Salerno)
Session
2-3:
Electronic Commerce
Session Chair: P. Spirakis
Distribution Chain Security
...................................................................................................63
G.
Durf
ее
(Stanford University) and M. Franklin (University of California, Davis)
Threshold-Based Identity Recovery for Privacy Enhanced Applications
.........................71
J. Biskup
and U.
Flegel
(University of Dortmund)
Reducing the Round Complexity of a Sealed-Bid Auction Protocol
with
Off-Line TTP....................................................................................................................80
Y. Watanabe and H. Imai (University of Tokyo)
XML Document Security Based on Provisional Authorization
..........................................87
M. Kudo and S.
Hada
(IBM Research, Toyko Research Laboratory)
Invited Talk: Security: The State of the Practice
..............................................................................97
R Ganesan
(CheckFree Corporation)
Panel: Which PKI (Public Key Infrastructure) is the Right One?
....................................................98
С
Adams (Entrust Technologies), M. Burmester (Royal Holloway-University of London),
Y. Desmedí
(Florida State University), M.
Reiter (Bell
Labs, Lucent Technologies),
and P. Zimmerman (PGP)
Session
3-1 :
Cryptography and Steganography
Session Chair: B. Preneel
Multi-Round Passive Attacks on Server-Aided RSA Protocols
.......................................102
J. Merkle (Secunet Security NetworL·
AG)
Simple Forward-Secure Signatures From Any Signature Scheme
.................................108
H. Krawczyk (Technion)
Moiré
Cryptography
..............................................................................................................116
Y. Desmedí
and TV.
Le (Florida
State University)
Funkspiel Schemes: An Alternative to Conventional Tamper Resistance
.....................125
J.
Hastad
(Royal Institute of Technology), J.
Jonsson,
A. Juels (RSA Laboratories),
and M. Yung (CertCo, Inc.)
Session
3-2:
Access Control
Session Chair: V. Varadharajan
Regulating Service Access and Information Release on the Web
..................................134
P. Bonatti and P. Samara
ti (Università di Milano)
vi
An Authorization Model for Temporal Data
.......................................................................144
A. Gal and V. Atluri (Rutgers University)
An Access Control Model for Simplifying Constraint Expression
..................................154
J. E. Tidswell (University of New South Wales) and Trent Jaeger (IBM T.J. Watson Research Center)
A Modular Approach to Composing Access Control Policies
.........................................164
P. Bonatti
(Università di Milano),
S. De
Capitani di Vimercati (Università di
Brescia),
and P. Samarati
(Università di Milano)
Session
4-1 :
Systems Security
Session Chair: E. Kiountouzis
Operating System Enhancements to Prevent the Misuse of System Calls
....................174
M. Bernaschi,
E. Gabrielli
(IAC-CNR), andh. V.
Mancini (Università di Roma La Sapienza )
Using Router Stamping to Identify the Source of IP Packets
..........................................184
T. W.
Doeppner, P.
N.
Klein (Brown University), A. Koyfman (Oracle Corporation)
Implementing a Distributed Firewall
...................................................................................190
S. Ioannidis, A. D. Keromytis (University of Pennsylvania), S. Bellovin (AT&T Labs-Research),
and!. M. Smith
(
University of Pennsylvania)
Security Enhanced Mobile Agents
.....................................................................................200
V. Varadharajan (University of West Sydney)
Session
4-2:
Internet Security and Composition
Session Chair: T. Apostolopoulos
PRUNES: An Efficient and Complete Strategy for Automated Trust
Negotiation over the Internet
..............................................................................................210
T. Yu, X. Ma, and M. Winslett (University of Illinois at Urbana-Champaign)
Cross Domain One-Shot Authorization using Smart Cards
.............................................220
R.
Au, M.
Looi
(Queensland University of Technology), and P. Ashley
(Tivoli,
Security Business Unit)
New Constructions for Multicast Re-keying Schemes using Perfect Hash Families
.....228
R. Safavi-Naini and H. Wang (University of Wollongong)
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups
.............235
Y. Kim (University of Southern California), A.
Perring
(University of California at Berkeley),
and G. Tsudik (University of California at Irvine)
Composition and Integrity Preservation of Secure Reactive Systems
...........................245
B.
Pfitzmann (Univerität des Saarlandes)
and
M.
Waidner (IBM Research Division)
Author
Index......................................................................................................................................255
|
any_adam_object | 1 |
author2 | Jajodia, Sushil 1947- |
author2_role | edt |
author2_variant | s j sj |
author_GND | (DE-588)120551683 |
author_corporate | Conference on Computer and Communications Security Athen |
author_corporate_role | aut |
author_facet | Jajodia, Sushil 1947- Conference on Computer and Communications Security Athen |
author_sort | Conference on Computer and Communications Security Athen |
building | Verbundindex |
bvnumber | BV013524596 |
classification_rvk | SS 2000 ST 276 ST 277 |
classification_tum | DAT 050f DAT 600f |
ctrlnum | (OCoLC)632752293 (DE-599)BVBBV013524596 |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01812nam a2200409 c 4500</leader><controlfield tag="001">BV013524596</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110331 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">010111s2000 d||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1581132034</subfield><subfield code="9">1-58113-203-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)632752293</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013524596</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 2000</subfield><subfield code="0">(DE-625)143437:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 600f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">Conference on Computer and Communications Security</subfield><subfield code="n">7</subfield><subfield code="d">2000</subfield><subfield code="c">Athen</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1704268-9</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000</subfield><subfield code="b">Athens, Greece November 1 - 4, 2000</subfield><subfield code="c">ed. by: Sushil Jajodia ...</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Seventh ACM Conference on Computer and Communications Security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">ACM Press</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 255 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2000</subfield><subfield code="z">Athen</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="d">1947-</subfield><subfield code="0">(DE-588)120551683</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Association for Computing Machinery</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1222-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung TU Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009231664&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009231664</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2000 Athen gnd-content |
genre_facet | Konferenzschrift 2000 Athen |
id | DE-604.BV013524596 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:47:19Z |
institution | BVB |
institution_GND | (DE-588)1704268-9 (DE-588)1222-1 |
isbn | 1581132034 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009231664 |
oclc_num | 632752293 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-20 DE-83 DE-11 DE-706 |
owner_facet | DE-91G DE-BY-TUM DE-20 DE-83 DE-11 DE-706 |
physical | XII, 255 S. graph. Darst. |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | ACM Press |
record_format | marc |
spelling | Conference on Computer and Communications Security 7 2000 Athen Verfasser (DE-588)1704268-9 aut Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000 Athens, Greece November 1 - 4, 2000 ed. by: Sushil Jajodia ... Seventh ACM Conference on Computer and Communications Security New York, NY ACM Press 2000 XII, 255 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2000 Athen gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Jajodia, Sushil 1947- (DE-588)120551683 edt Association for Computing Machinery Sonstige (DE-588)1222-1 oth Digitalisierung TU Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009231664&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000 Athens, Greece November 1 - 4, 2000 Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)1071861417 |
title | Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000 Athens, Greece November 1 - 4, 2000 |
title_alt | Seventh ACM Conference on Computer and Communications Security |
title_auth | Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000 Athens, Greece November 1 - 4, 2000 |
title_exact_search | Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000 Athens, Greece November 1 - 4, 2000 |
title_full | Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000 Athens, Greece November 1 - 4, 2000 ed. by: Sushil Jajodia ... |
title_fullStr | Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000 Athens, Greece November 1 - 4, 2000 ed. by: Sushil Jajodia ... |
title_full_unstemmed | Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000 Athens, Greece November 1 - 4, 2000 ed. by: Sushil Jajodia ... |
title_short | Proceedings of the 7th ACM Conference on Computer and Communicatitons Security, CCS 2000 |
title_sort | proceedings of the 7th acm conference on computer and communicatitons security ccs 2000 athens greece november 1 4 2000 |
title_sub | Athens, Greece November 1 - 4, 2000 |
topic | Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computersicherheit Konferenzschrift 2000 Athen |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009231664&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT conferenceoncomputerandcommunicationssecurityathen proceedingsofthe7thacmconferenceoncomputerandcommunicatitonssecurityccs2000athensgreecenovember142000 AT jajodiasushil proceedingsofthe7thacmconferenceoncomputerandcommunicatitonssecurityccs2000athensgreecenovember142000 AT associationforcomputingmachinery proceedingsofthe7thacmconferenceoncomputerandcommunicatitonssecurityccs2000athensgreecenovember142000 AT conferenceoncomputerandcommunicationssecurityathen seventhacmconferenceoncomputerandcommunicationssecurity AT jajodiasushil seventhacmconferenceoncomputerandcommunicationssecurity AT associationforcomputingmachinery seventhacmconferenceoncomputerandcommunicationssecurity |