{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T05:23:54Z","timestamp":1672464234019},"reference-count":1,"publisher":"Association for Computing Machinery (ACM)","issue":"4","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[1997,7]]},"abstract":"The 4th ACM Conference on Computer and Communications Security [1] was held on 1-4 April 1997 in Zurich, Switzerland. About 100 participants from around the world gathered to discuss advances being made primarily in the area of defensive information warfare. This was primarily a research-oriented event which attracted principal investigators working in the security field from about 14 nations. I attended the conference for the following four reasons:&bull; I wanted to update my knowledge of the area.&bull; I wanted to ascertain what progress has been made in the field.&bull; I wanted to determine whether there were any breakthrough technologies on the horizon.&bull; I wanted to understand the threats being guarded against and the defensive strategies that leaders in the field were recommending.As I will relate later, significant progress has been in many defensive information warfare areas. I particularly was impressed by the advances that have been made in the area of cryptography, digital signatures and communications protocols. I was disappointed by the perceived lack of progress over the years in the important area of trusted systems and information security infrastructure development.This was the first conference that I have attended on the subject in about a decade. I selected the event because I thought that it would allow me to view both present work in the field and look into the future.<\/jats:p>","DOI":"10.1145\/263244.773581","type":"journal-article","created":{"date-parts":[[2004,7,21]],"date-time":"2004-07-21T23:30:10Z","timestamp":1090452610000},"page":"32-33","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Report: 4th ACM Conference On Computer and Communications Security"],"prefix":"10.1145","volume":"22","author":[{"given":"Donald J.","family":"Reifer","sequence":"first","affiliation":[{"name":"President, Reifer Consultants, Inc."}]}],"member":"320","published-online":{"date-parts":[[1997,7]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of 4th ACM Conference on Computer and Communications Security","author":"Association for Computing Machinery","year":"1997"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/263244.773581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T18:34:51Z","timestamp":1672425291000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/263244.773581"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,7]]},"references-count":1,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1997,7]]}},"alternative-id":["10.1145\/263244.773581"],"URL":"https:\/\/doi.org\/10.1145\/263244.773581","relation":{},"ISSN":["0163-5948"],"issn-type":[{"value":"0163-5948","type":"print"}],"subject":[],"published":{"date-parts":[[1997,7]]},"assertion":[{"value":"1997-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}