We are delighted to join Ari Juels in welcoming you to the 13th ACM Conference on Computer and Communications Security, held October 30 to November 3, 2006 at the Hilton Alexandria Mark Center, Alexandria, Virginia, USA. These proceedings contain 38 papers presented in the research track and a paper contributed by our keynote speaker, Peter Neumann. The conference also comprises an industry track, tutorials, and workshops.The 38 research track papers contained in this proceedings were selected from 256 received submissions. These submissions were carefully reviewed by at least three members of the program committee, or four in the case of papers authored by program committee members. Reviewing was double-blind, meaning that the program committee was not able to see the names and affiliations of the authors, and the authors were not told which committee members reviewed which papers. Program committee members were allowed to use external reviewers, but were responsible for the contents of the review and representing papers during the decision making. The review phase was followed by a three-week discussion phase in which each paper with at least one supporting review was discussed, outside experts were consulted where needed, and final decisions were made.
System and network trustworthiness in perspective
Characteristic problem areas experienced in the past are considered here, as well as some of the challenges that must be confronted in trying to achieve greater trustworthiness in computer systems and networks and in the overall environments in which ...
Cited By
-
Zhang X, Mu D, Zhang W and Dong X (2024). Authenticated Encryption for the LOL Framework 2024 6th International Conference on Electronic Engineering and Informatics (EEI), 10.1109/EEI63073.2024.10696488, 979-8-3503-5359-4, (1313-1317)
-
De Capitani di Vimercati S, Foresti S, Livraga G, Samarati P, Agaian S, DelMarco S and Asari V (2019). Data security and privacy in the cloud Mobile Multimedia/Image Processing, Security, and Applications 2019, 10.1117/12.2523603, 9781510626515, (15)
-
Blowers M, Williams J, Nelson K, Corbin G and Blowers M (2014). Evaluating data distribution and drift vulnerabilities of machine learning algorithms in secure and adversarial environments SPIE Sensing Technology + Applications, 10.1117/12.2053045, , (911904), Online publication date: 22-May-2014.
- Proceedings of the 13th ACM conference on Computer and communications security