Trusted Information: The New Decade Challenge
Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec’01 is the first of t...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2001
|
Ausgabe: | 1st ed. 2001 |
Schriftenreihe: | IFIP Advances in Information and Communication Technology
65 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec’01 is the first of this decade (and century) and it will be devoted to "Trusted Information - the New Decade Challenge" This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management. The year 2001 is a double anniversary. First, fifteen years ago, the first IFIP/Sec was held in France (IFIP/Sec’86, Monte-Carlo) and 2001 is also the anniversary of smart card technology. Smart cards emerged some twenty years ago as an innovation and have now become pervasive information devices used for highly distributed secure applications. These cards let millions of people carry a highly secure device that can represent them on a variety of networks. To conclude, we hope that the rich "menu" of conference papers for this IFIP/Sec conference will provide valuable insights and encourage specialists to pursue their work in trusted information |
Beschreibung: | 1 Online-Ressource (XVIII, 490 p) |
ISBN: | 9780306469985 |
DOI: | 10.1007/b116847 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064458 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2001 |||| o||u| ||||||eng d | ||
020 | |a 9780306469985 |9 978-0-306-46998-5 | ||
024 | 7 | |a 10.1007/b116847 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-306-46998-5 | ||
035 | |a (OCoLC)1227480718 | ||
035 | |a (DE-599)BVBBV047064458 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 658.4092 |2 23 | |
084 | |a SS 2001 |0 (DE-625)143438: |2 rvk | ||
245 | 1 | 0 | |a Trusted Information |b The New Decade Challenge |c edited by Michel Dupuy, Pierre Paradinas |
250 | |a 1st ed. 2001 | ||
264 | 1 | |a New York, NY |b Springer US |c 2001 | |
300 | |a 1 Online-Ressource (XVIII, 490 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IFIP Advances in Information and Communication Technology |v 65 | |
520 | |a Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec’01 is the first of this decade (and century) and it will be devoted to "Trusted Information - the New Decade Challenge" This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management. The year 2001 is a double anniversary. First, fifteen years ago, the first IFIP/Sec was held in France (IFIP/Sec’86, Monte-Carlo) and 2001 is also the anniversary of smart card technology. Smart cards emerged some twenty years ago as an innovation and have now become pervasive information devices used for highly distributed secure applications. These cards let millions of people carry a highly secure device that can represent them on a variety of networks. To conclude, we hope that the rich "menu" of conference papers for this IFIP/Sec conference will provide valuable insights and encourage specialists to pursue their work in trusted information | ||
650 | 4 | |a Business Strategy/Leadership | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Business Mathematics | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Leadership | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Business mathematics | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computers | |
650 | 4 | |a Data structures (Computer science) | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Dupuy, Michel |4 edt | |
700 | 1 | |a Paradinas, Pierre |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475775365 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780792373896 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475775358 |
856 | 4 | 0 | |u https://doi.org/10.1007/b116847 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471569 | ||
966 | e | |u https://doi.org/10.1007/b116847 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062497792000 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Dupuy, Michel Paradinas, Pierre |
author2_role | edt edt |
author2_variant | m d md p p pp |
author_facet | Dupuy, Michel Paradinas, Pierre |
building | Verbundindex |
bvnumber | BV047064458 |
classification_rvk | SS 2001 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-0-306-46998-5 (OCoLC)1227480718 (DE-599)BVBBV047064458 |
dewey-full | 658.4092 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4092 |
dewey-search | 658.4092 |
dewey-sort | 3658.4092 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.1007/b116847 |
edition | 1st ed. 2001 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03666nmm a2200601zcb4500</leader><controlfield tag="001">BV047064458</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780306469985</subfield><subfield code="9">978-0-306-46998-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/b116847</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-306-46998-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227480718</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064458</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4092</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 2001</subfield><subfield code="0">(DE-625)143438:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted Information</subfield><subfield code="b">The New Decade Challenge</subfield><subfield code="c">edited by Michel Dupuy, Pierre Paradinas</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2001</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVIII, 490 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">65</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec’01 is the first of this decade (and century) and it will be devoted to "Trusted Information - the New Decade Challenge" This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management. The year 2001 is a double anniversary. First, fifteen years ago, the first IFIP/Sec was held in France (IFIP/Sec’86, Monte-Carlo) and 2001 is also the anniversary of smart card technology. Smart cards emerged some twenty years ago as an innovation and have now become pervasive information devices used for highly distributed secure applications. These cards let millions of people carry a highly secure device that can represent them on a variety of networks. To conclude, we hope that the rich "menu" of conference papers for this IFIP/Sec conference will provide valuable insights and encourage specialists to pursue their work in trusted information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business Strategy/Leadership</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Leadership</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dupuy, Michel</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Paradinas, Pierre</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475775365</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780792373896</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475775358</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/b116847</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471569</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b116847</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV047064458 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9780306469985 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471569 |
oclc_num | 1227480718 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XVIII, 490 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Springer US |
record_format | marc |
series2 | IFIP Advances in Information and Communication Technology |
spelling | Trusted Information The New Decade Challenge edited by Michel Dupuy, Pierre Paradinas 1st ed. 2001 New York, NY Springer US 2001 1 Online-Ressource (XVIII, 490 p) txt rdacontent c rdamedia cr rdacarrier IFIP Advances in Information and Communication Technology 65 Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec’01 is the first of this decade (and century) and it will be devoted to "Trusted Information - the New Decade Challenge" This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management. The year 2001 is a double anniversary. First, fifteen years ago, the first IFIP/Sec was held in France (IFIP/Sec’86, Monte-Carlo) and 2001 is also the anniversary of smart card technology. Smart cards emerged some twenty years ago as an innovation and have now become pervasive information devices used for highly distributed secure applications. These cards let millions of people carry a highly secure device that can represent them on a variety of networks. To conclude, we hope that the rich "menu" of conference papers for this IFIP/Sec conference will provide valuable insights and encourage specialists to pursue their work in trusted information Business Strategy/Leadership Cryptology Business Mathematics Management of Computing and Information Systems Theory of Computation Data Structures and Information Theory Leadership Data encryption (Computer science) Business mathematics Management information systems Computer science Computers Data structures (Computer science) (DE-588)1071861417 Konferenzschrift gnd-content Dupuy, Michel edt Paradinas, Pierre edt Erscheint auch als Druck-Ausgabe 9781475775365 Erscheint auch als Druck-Ausgabe 9780792373896 Erscheint auch als Druck-Ausgabe 9781475775358 https://doi.org/10.1007/b116847 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Trusted Information The New Decade Challenge Business Strategy/Leadership Cryptology Business Mathematics Management of Computing and Information Systems Theory of Computation Data Structures and Information Theory Leadership Data encryption (Computer science) Business mathematics Management information systems Computer science Computers Data structures (Computer science) |
subject_GND | (DE-588)1071861417 |
title | Trusted Information The New Decade Challenge |
title_auth | Trusted Information The New Decade Challenge |
title_exact_search | Trusted Information The New Decade Challenge |
title_exact_search_txtP | Trusted Information The New Decade Challenge |
title_full | Trusted Information The New Decade Challenge edited by Michel Dupuy, Pierre Paradinas |
title_fullStr | Trusted Information The New Decade Challenge edited by Michel Dupuy, Pierre Paradinas |
title_full_unstemmed | Trusted Information The New Decade Challenge edited by Michel Dupuy, Pierre Paradinas |
title_short | Trusted Information |
title_sort | trusted information the new decade challenge |
title_sub | The New Decade Challenge |
topic | Business Strategy/Leadership Cryptology Business Mathematics Management of Computing and Information Systems Theory of Computation Data Structures and Information Theory Leadership Data encryption (Computer science) Business mathematics Management information systems Computer science Computers Data structures (Computer science) |
topic_facet | Business Strategy/Leadership Cryptology Business Mathematics Management of Computing and Information Systems Theory of Computation Data Structures and Information Theory Leadership Data encryption (Computer science) Business mathematics Management information systems Computer science Computers Data structures (Computer science) Konferenzschrift |
url | https://doi.org/10.1007/b116847 |
work_keys_str_mv | AT dupuymichel trustedinformationthenewdecadechallenge AT paradinaspierre trustedinformationthenewdecadechallenge |