Advertisement

Certification and Security in Inter-Organizational E-Service

  • Editors
  • Enrico Nardelli
  • Maurizio Talamo
Conference proceedings IFIP WCC TC11 2004

Part of the IFIP On-Line Library in Computer Science book series (IFIPAICT, volume 177)

Table of contents

  1. Front Matter
    Pages i-4
  2. Franco Arcieri, Mario Ciclosi, Andrea Dimitri, Fabio Fioravanti, Enrico Nardelli, Maurizio Talamo
    Pages 5-18
  3. Almut Herzog, Nahid Shahmehri
    Pages 19-32
  4. Benjamin Tobler, Andrew C. M. Hutchison
    Pages 33-53
  5. Matt Barrett, Clark Thomborson
    Pages 55-74
  6. Tadasuke Nakagawa, Shigeyuki Tani, Chizuko Yasunobu, Norihisa Komoda
    Pages 85-90
  7. Vincenzo Auletta, Carlo Blundo, Stelvio Cimato, Guerriero Raimato
    Pages 91-100
  8. Giovanna Melideo, Guido Proietti
    Pages 101-112
  9. Jan Muntermann, Heiko Roßnagel, Jan Muntermann, Kai Rannenberg
    Pages 129-139
  10. Jong-Gook Ko, Ki-Young Kim, Keul-Woo Ryu
    Pages 141-149

About these proceedings

Introduction

International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit springeronline.com.

 

Keywords

IT enabled Government operations Monitor communication e-services firewall game theory identity cards mobile commerce network intrusion detection organization risk analysis secure execution environment security security protocol untrusted code

Bibliographic information

  • DOI https://doi.org/10.1007/11397427
  • Copyright Information Springer-Verlag US 2005
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-25087-8
  • Online ISBN 978-0-387-25088-5
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site