Proceedings of the 8th ACM Conference on Computer and Communications Security: (CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
ACM Press
2001
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VIII, 265 S. Ill., graph. Darst. |
ISBN: | 1581133855 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV014306360 | ||
003 | DE-604 | ||
005 | 20031215 | ||
007 | t| | ||
008 | 020522s2001 xx ad|| |||| 10||| eng d | ||
020 | |a 1581133855 |9 1-58113-385-5 | ||
035 | |a (OCoLC)473293030 | ||
035 | |a (DE-599)BVBBV014306360 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-20 |a DE-91G |a DE-11 |a DE-188 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
111 | 2 | |a CCS |n 8 |d 2001 |c Philadelphia, Pa. |j Verfasser |0 (DE-588)10038879-6 |4 aut | |
245 | 1 | 0 | |a Proceedings of the 8th ACM Conference on Computer and Communications Security |b (CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA |c ed. by Pierangela Samarati |
264 | 1 | |a New York, NY |b ACM Press |c 2001 | |
300 | |a VIII, 265 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2001 |z Philadelphia Pa. |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Samarati, Pierangela |e Sonstige |4 oth | |
710 | 2 | |a Association for Computing Machinery |e Sonstige |0 (DE-588)1222-1 |4 oth | |
856 | 4 | 2 | |m Digitalisierung TU Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009813714&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-009813714 |
Datensatz im Suchindex
_version_ | 1820868253254156288 |
---|---|
adam_text |
Table
of Contents
Conference Committee
.
vii
Contributions
.
vii
Program Committee
.
vii-viii
External Reviewers
.viii
Session: Password Management and Digital Signatures
Error-Tolerant Password Recovery
.
ι
.V. Fiykholm, A. Jitels (RSA Laboratories)
Delegation of Cryptographic Servers for Capture-Resilient Devices.
10
P. MacKenzie, M. K.
Reiter (Bell
Labs, Lucent Technologies)
Twin Signatures: an Alternative to the Hash-and-Sign Paradigm
.20
D. Naccache
(Gemplus
Card International), D. Pointcheval, J. Stern
(École Normale
Supérieure)
The BiBa One-Time Signature and Broadcast Authentication
ProtOCOl
.28
A. Perrig (University of California, Berkeley)
Session: Access Control
Policy Algebras for Access Control -The Propositional Case
.38
D. Wijesekera, S. Jajodia (George Mason University)
A Chinese Wall Security Model for Decentralized Workflow Systems.
.48
V. Atluri. S. A. Chun (Rutgers University), P. Mazzoleni
(Universita
di Milano)
Design and Implementation of a Flexible RBAC-Service
in an Object-Oriented Scripting Language
.58
G
Neumann. M. Strembeck (Vienna University of Economics and
В
A)
Session: Mobile Code and Distributed Systems
An Efficient Security Verification Method for Programs
with Stack Inspection
.68
Л.
Sitta.
}.
Takata, H. Seki (Sara Institute ofScience and Technology)
The Performance of Public Key-Enabled
Kerberos
Authentication in Mobile Computing Applications
.78
A. Harhiiter
ι
PEC Solutions. Inc.), D.
A. Menasce (George
Mason University)
A New Approach to DNS Security (DNSSEC)
.86
G.
Ateniese
(The John Hopkins University), S.
Mangard (Graz
University of Technology)
Session: Protocols
Events in Security Protocols
.96
F. Crazzolara, G. Winskel (University of Cambridge)
On the Relationship between Strand Spaces
and Multi-Agent Systems
.
106
J. Y. Halpern, R. Pucella (Cornell University)
A Verifiable Secret Shuffle and its Application to
Е
-Voting.
ііб
С
A. Neff(VoteHere, Inc.)
Session: Secure Data Publishing and Certificate Management
Tangier: A Censorship-Resistant Publishing System Based
on Document Entanglements
.126
M. Waldman, D.
Mazières (New
York University)
Flexible Authentication of XML Documents
.
ізб
P. Devanbu, M.
Gertz,
A. Kwong, C.
Martel,
G.
Nuckoils
(University of California, Davis),
S. G.
Stubblebine (Stubblebine Consulting)
Interoperable Strategies in Automated Trust Negotiation
.
hó
T. Yu, M. Winslett (University of Illinois—Urbana-Champaign).
K. E. Seamons (Brigham Young University)
Distributed Credential Chain Discovery in Trust Management
.
\зь
A'. Li (Stanford University), IV. H. Winsborough (Network Associates. Inc.).
J. C. Mitchell (Stanford University)
Session: Protocol Analysis
Constraint Solving for Bounded-Process Cryptographic Protocol
Analysis
.166
J. Milieu. V. Shmatikov (SRI International)
Inductive Methods and Contract-Signing Protocols
.1 6
R. Chadha.
M
Kanovich. A. Sccdrov
t L
niversity of Pennsylvania/
The Faithfulness of Abstract Protocol Analysis: Message
Authentication
.1*6
,/.
D. Guttmun. F. J. Thayer /The MITRE Corporation), I. I).
Zuck
ŕ.Vu
York l
'¡livellavi
Session:
Cryptosystems
ОСВ: А
Block-Cipher Mode of Operation for Efficient
Authenticated Encryption
.196
P. Rogaway (University of California, Davis
&
Chiang Mai University),
M.
Bellore
(University of California, San Diego), J. Black (University of Nevada),
T. Krovetz (Digital Fountain)
Paillier's Cryptosystem Revisited
.
206
D.
Catalano (Università di
Catania),
R.
Gennaro,
N. Howgrave-Graham (IBMResearch),
P. Q. Nguyen
(Ecole
Normale
Supérieure)
Securely Combining Public-Key Cryptosystems
.215
51
Haber,
В.
Pinkas (STAR Lab,
Intertrust
Technologies)
Session: Group Key Management and Signatures
Practical Forward Secure Group Signature Schemes
.225
D. X. Song (University of California, Berkeley)
Formalizing GDOI Group Key Management Requirements
inNPATRL
.235
C. Meadows, P. Syverson (Naval Research Laboratory), I. Cervesato (ITT Industries, Inc.)
Accountable-Subgroup Multisignatures
.245
S.
Micali
(Massachusetts Institute of Technology),
K. Ohta (The University of Electro-Communications), L. Reyzin (Boston University)
Provably
Authenticated Group Diffie-Hellman Key Exchange
.255
E. Bresson
(École Normale Supérieure),
О.
Chevassut
(University
Catholique de Louvain),
D. Pointcheval (École Normale Supérieure),
J.-J. Quisquater
(University
Catholique de Louvain)
Author
Index
.265 |
any_adam_object | 1 |
author_corporate | CCS Philadelphia, Pa |
author_corporate_role | aut |
author_facet | CCS Philadelphia, Pa |
author_sort | CCS Philadelphia, Pa |
building | Verbundindex |
bvnumber | BV014306360 |
classification_rvk | ST 277 |
classification_tum | DAT 460f |
ctrlnum | (OCoLC)473293030 (DE-599)BVBBV014306360 |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV014306360</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20031215</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">020522s2001 xx ad|| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1581133855</subfield><subfield code="9">1-58113-385-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)473293030</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014306360</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">CCS</subfield><subfield code="n">8</subfield><subfield code="d">2001</subfield><subfield code="c">Philadelphia, Pa.</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)10038879-6</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of the 8th ACM Conference on Computer and Communications Security</subfield><subfield code="b">(CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA</subfield><subfield code="c">ed. by Pierangela Samarati</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">ACM Press</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 265 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2001</subfield><subfield code="z">Philadelphia Pa.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samarati, Pierangela</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Association for Computing Machinery</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1222-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung TU Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009813714&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009813714</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2001 Philadelphia Pa. gnd-content |
genre_facet | Konferenzschrift 2001 Philadelphia Pa. |
id | DE-604.BV014306360 |
illustrated | Illustrated |
indexdate | 2025-01-10T13:21:26Z |
institution | BVB |
institution_GND | (DE-588)10038879-6 (DE-588)1222-1 |
isbn | 1581133855 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009813714 |
oclc_num | 473293030 |
open_access_boolean | |
owner | DE-20 DE-91G DE-BY-TUM DE-11 DE-188 |
owner_facet | DE-20 DE-91G DE-BY-TUM DE-11 DE-188 |
physical | VIII, 265 S. Ill., graph. Darst. |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | ACM Press |
record_format | marc |
spelling | CCS 8 2001 Philadelphia, Pa. Verfasser (DE-588)10038879-6 aut Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA ed. by Pierangela Samarati New York, NY ACM Press 2001 VIII, 265 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2001 Philadelphia Pa. gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Samarati, Pierangela Sonstige oth Association for Computing Machinery Sonstige (DE-588)1222-1 oth Digitalisierung TU Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009813714&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)1071861417 |
title | Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA |
title_auth | Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA |
title_exact_search | Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA |
title_full | Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA ed. by Pierangela Samarati |
title_fullStr | Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA ed. by Pierangela Samarati |
title_full_unstemmed | Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA ed. by Pierangela Samarati |
title_short | Proceedings of the 8th ACM Conference on Computer and Communications Security |
title_sort | proceedings of the 8th acm conference on computer and communications security ccs 8 november 5 8 2001 philadelphia pennsylvania usa |
title_sub | (CCS 8) ; November 5 - 8, 2001, Philadelphia, Pennsylvania, USA |
topic | Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computersicherheit Konferenzschrift 2001 Philadelphia Pa. |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009813714&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ccsphiladelphiapa proceedingsofthe8thacmconferenceoncomputerandcommunicationssecurityccs8november582001philadelphiapennsylvaniausa AT samaratipierangela proceedingsofthe8thacmconferenceoncomputerandcommunicationssecurityccs8november582001philadelphiapennsylvaniausa AT associationforcomputingmachinery proceedingsofthe8thacmconferenceoncomputerandcommunicationssecurityccs8november582001philadelphiapennsylvaniausa |