Information Security for Global Information Infrastructures

IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China

  • Sihan Qing
  • Jan H. P. Eloff
Conference proceedings

DOI: 10.1007/978-0-387-35515-3

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 47)

Table of contents

  1. Front Matter
    Pages i-xv
  2. Reviewed Papers

    1. Front Matter
      Pages xv-xv
    2. Kai Rannenberg
      Pages 1-10
    3. M. M. Eloff, S. H. Von Solms
      Pages 11-18
    4. Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis
      Pages 37-47
    5. E. Von Solms, S. H. Von Solms
      Pages 59-68
    6. Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng
      Pages 69-78
    7. Wolfgang Essmayr, Edgar Weippl
      Pages 79-88
    8. Herbert Leitold, Peter Lipp, Andreas Sterbenz
      Pages 89-98
    9. Costas Lambrinoudakis
      Pages 131-140
    10. A. Liebenberg, J. H. P. Eloff
      Pages 141-150
    11. S. Dawson, S. De Capitani di Vimercati, P. Lincoln, P. Samarati
      Pages 151-160
    12. Jiahai Yang, Peng Ning, X. Sean Wang, Sushil Jajodia
      Pages 171-180

About these proceedings

Introduction

IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings.

Keywords

Audit Auditor Denial of Service E-Commerce IT security Mapping algorithms communication computer science computer security distributed computing distributed systems information modeling network security

Editors and affiliations

  • Sihan Qing
    • 1
  • Jan H. P. Eloff
    • 2
  1. 1.Engineering Research Center for Information Security TechnologyChinese Academy of SciencesChina
  2. 2.Rand Afrikaans UniversitySouth Africa

Bibliographic information

  • Copyright Information IFIP International Federation for Information Processing 2000
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4757-5479-7
  • Online ISBN 978-0-387-35515-3
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X