Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless i...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2000
|
Ausgabe: | 1st ed. 2000 |
Schriftenreihe: | IFIP Advances in Information and Communication Technology
47 |
Schlagworte: | |
Online-Zugang: | UBY01 URL des Eerstveröffentlichers |
Zusammenfassung: | IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings |
Beschreibung: | 1 Online-Ressource (XVIII, 514 p) |
ISBN: | 9780387355153 |
DOI: | 10.1007/978-0-387-35515-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064530 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2000 |||| o||u| ||||||eng d | ||
020 | |a 9780387355153 |9 978-0-387-35515-3 | ||
024 | 7 | |a 10.1007/978-0-387-35515-3 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-387-35515-3 | ||
035 | |a (OCoLC)1227478138 | ||
035 | |a (DE-599)BVBBV047064530 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 004.0151 |2 23 | |
245 | 1 | 0 | |a Information Security for Global Information Infrastructures |b IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China |c edited by Sihan Qing, Jan H.P. Eloff |
250 | |a 1st ed. 2000 | ||
264 | 1 | |a New York, NY |b Springer US |c 2000 | |
300 | |a 1 Online-Ressource (XVIII, 514 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IFIP Advances in Information and Communication Technology |v 47 | |
520 | |a IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings | ||
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Computer Applications | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a IT in Business | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Computers | |
650 | 4 | |a Application software | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Information technology | |
650 | 4 | |a Business—Data processing | |
650 | 4 | |a Artificial intelligence | |
700 | 0 | |a Sihan Qing |4 edt | |
700 | 1 | |a Eloff, Jan H.P. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475754797 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780792379140 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475754780 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-0-387-35515-3 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471642 | ||
966 | e | |u https://doi.org/10.1007/978-0-387-35515-3 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062694924288 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Sihan Qing Eloff, Jan H.P |
author2_role | edt edt |
author2_variant | s q sq j h e jh jhe |
author_facet | Sihan Qing Eloff, Jan H.P |
building | Verbundindex |
bvnumber | BV047064530 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-0-387-35515-3 (OCoLC)1227478138 (DE-599)BVBBV047064530 |
dewey-full | 004.0151 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.0151 |
dewey-search | 004.0151 |
dewey-sort | 14.0151 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-0-387-35515-3 |
edition | 1st ed. 2000 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03829nmm a2200589zcb4500</leader><controlfield tag="001">BV047064530</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2000 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387355153</subfield><subfield code="9">978-0-387-35515-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-0-387-35515-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-387-35515-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227478138</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064530</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.0151</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Security for Global Information Infrastructures</subfield><subfield code="b">IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China</subfield><subfield code="c">edited by Sihan Qing, Jan H.P. Eloff</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2000</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVIII, 514 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">47</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT in Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business—Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Sihan Qing</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Eloff, Jan H.P.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475754797</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780792379140</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475754780</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-0-387-35515-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471642</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-35515-3</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064530 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9780387355153 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471642 |
oclc_num | 1227478138 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XVIII, 514 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Springer US |
record_format | marc |
series2 | IFIP Advances in Information and Communication Technology |
spelling | Information Security for Global Information Infrastructures IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China edited by Sihan Qing, Jan H.P. Eloff 1st ed. 2000 New York, NY Springer US 2000 1 Online-Ressource (XVIII, 514 p) txt rdacontent c rdamedia cr rdacarrier IFIP Advances in Information and Communication Technology 47 IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings Theory of Computation Computer Applications Management of Computing and Information Systems Data Structures and Information Theory IT in Business Artificial Intelligence Computers Application software Management information systems Computer science Data structures (Computer science) Information technology Business—Data processing Artificial intelligence Sihan Qing edt Eloff, Jan H.P. edt Erscheint auch als Druck-Ausgabe 9781475754797 Erscheint auch als Druck-Ausgabe 9780792379140 Erscheint auch als Druck-Ausgabe 9781475754780 https://doi.org/10.1007/978-0-387-35515-3 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Information Security for Global Information Infrastructures IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China Theory of Computation Computer Applications Management of Computing and Information Systems Data Structures and Information Theory IT in Business Artificial Intelligence Computers Application software Management information systems Computer science Data structures (Computer science) Information technology Business—Data processing Artificial intelligence |
title | Information Security for Global Information Infrastructures IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China |
title_auth | Information Security for Global Information Infrastructures IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China |
title_exact_search | Information Security for Global Information Infrastructures IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China |
title_exact_search_txtP | Information Security for Global Information Infrastructures IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China |
title_full | Information Security for Global Information Infrastructures IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China edited by Sihan Qing, Jan H.P. Eloff |
title_fullStr | Information Security for Global Information Infrastructures IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China edited by Sihan Qing, Jan H.P. Eloff |
title_full_unstemmed | Information Security for Global Information Infrastructures IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China edited by Sihan Qing, Jan H.P. Eloff |
title_short | Information Security for Global Information Infrastructures |
title_sort | information security for global information infrastructures ifip tc11 sixteenth annual working conference on information security august 22 24 2000 beijing china |
title_sub | IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China |
topic | Theory of Computation Computer Applications Management of Computing and Information Systems Data Structures and Information Theory IT in Business Artificial Intelligence Computers Application software Management information systems Computer science Data structures (Computer science) Information technology Business—Data processing Artificial intelligence |
topic_facet | Theory of Computation Computer Applications Management of Computing and Information Systems Data Structures and Information Theory IT in Business Artificial Intelligence Computers Application software Management information systems Computer science Data structures (Computer science) Information technology Business—Data processing Artificial intelligence |
url | https://doi.org/10.1007/978-0-387-35515-3 |
work_keys_str_mv | AT sihanqing informationsecurityforglobalinformationinfrastructuresifiptc11sixteenthannualworkingconferenceoninformationsecurityaugust22242000beijingchina AT eloffjanhp informationsecurityforglobalinformationinfrastructuresifiptc11sixteenthannualworkingconferenceoninformationsecurityaugust22242000beijingchina |