【24h】

Privacy cognizant information systems

机译:隐私认知信息系统

获取原文

摘要

It is my pleasure to welcome you to the Tenth ACM Conference on Computer and Communications Security. This year the CCS Conference offers an outstanding technical program. I hope that you will find it stimulating and a source of inspiration for your future research.I would like to thank several individuals who were responsible for the organization of this conference. First, thanks go to Vijay Atluri and the members of the program committee for selecting the papers included in the research track. The number of submissions this year far exceeded those in previous years. Program committee responsibilities entailed a lot more work this year, but everyone rose to meet the challenge. The standards for acceptance continued to remain high for ensuring a quality program.Second, I'd like to point out that this year's Conference program has been expanded to include a parallel industry and tutorials track. I want to thank Trent Jaeger for accepting the challenge to serve as the program chair of the industry track and Ravi Sandhu for performing a fantastic job as the tutorials chair. Although some attendees will be inconvenienced by the parallel tracks, I strongly believe that most will benefit from the additional choices this track offers. Also of note is that the workshops that have become an integral part of CCS Conferences in the past have continued, with eight workshops provided this year. I would like to extend my sincere thanks to everyone who helped organize these workshops, especially the workshop program chairs: Michael Backes, David Basin, and Michael Waidner (Workshop on Formal Methods in Security Engineering: From Specifications to Code); Wouter Joosen and Ravi Sandhu (Workshop on Business Driven Security Engineering); Michiharu Kudo (Workshop on XML Security); Peng Liu and Partha Pal (Workshop on Survival and Self-Regenerative Systems; Pierangela Samarati and Paul Syverson (Workshop on Privacy in the Electronic Society); Stefan Savage (Workshop on Rapid Malacode); Vipin Swarup and Sanjeev Setia(Workshop on Security of Ad Hoc and Sensor Networks); and Moti Yung (Workshop on Digital Rights Management).
机译:我很高兴欢迎您参加第十届ACM计算机和通信安全性会议。今年,CCS会议提供了出色的技术计划。我希望您能从中获得启发,并为您以后的研究提供灵感。我要感谢负责本次会议组织工作的多位个人。首先,感谢Vijay Atluri和计划委员会的成员选择了研究方向中包含的论文。今年的提交数量远远超过了往年。计划委员会的职责今年需要做更多的工作,但是每个人都必须迎接挑战。接受标准仍然很高,以确保程序质量。其次,我想指出,今年的会议程序已经扩展到包括并行的行业和教程轨道。我要感谢Trent Jaeger接受挑战,担任行业轨道程序主席,并感谢Ravi Sandhu担任出色的教程主席。尽管有些与会者会因平行轨道而感到不便,但我坚信大多数人将从该轨道提供的其他选择中受益。还要注意的是,过去已成为CCS会议不可或缺的一部分的研讨会仍在继续,今年已举办了八次研讨会。我要衷心感谢所有组织这些研讨会的人员,特别是研讨会计划主持人:Michael Backes,David Basin和Michael Waidner(安全工程中的正式方法:从规范到代码); Wouter Joosen和Ravi Sandhu(业务驱动安全工程讲习班); Michiharu Kudo(XML安全性研讨会); Liu Peng和Partha Pal(生存和自我再生系统研讨会; Pierangela Samarati和Paul Syverson(电子社会隐私研讨会); Stefan Savage(Rapid Malacode研讨会); Vipin Swarup和Sanjeev Setia(广告安全研讨会) Hoc和Sensor网络)和Moti Yung(数字版权管理工作室)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号