{"title":"WETICE 2005 Tenth Securities Technologies (ST) Workshop Report (Formerly Enterprise Security (ES))","authors":"D. Gilliam","doi":"10.1109/WETICE.2005.68","DOIUrl":null,"url":null,"abstract":"The Securities Technologies (ST) Workshop was formerly called the Enterprise Security (ES) Workshop. The name was changed to reflect better a more comprehensive name to the topics being discussed which ranged beyond just security in and for the enterprise. The Workshop deals with topics that span multiple enterprises, including Peer to Peer (P2P), Grid Computing, security of large-scale backbones, software security, et al. Consequently, it was suggested that the Workshop consider a name change to more accurately reflect the topics of the papers it was receiving and delivering. Several names were considered and Security Technologies was selected. However, the name Enterprise Security has not been dropped as it was the name under which it was organized originally.","PeriodicalId":128074,"journal":{"name":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WETICE.2005.68","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The Securities Technologies (ST) Workshop was formerly called the Enterprise Security (ES) Workshop. The name was changed to reflect better a more comprehensive name to the topics being discussed which ranged beyond just security in and for the enterprise. The Workshop deals with topics that span multiple enterprises, including Peer to Peer (P2P), Grid Computing, security of large-scale backbones, software security, et al. Consequently, it was suggested that the Workshop consider a name change to more accurately reflect the topics of the papers it was receiving and delivering. Several names were considered and Security Technologies was selected. However, the name Enterprise Security has not been dropped as it was the name under which it was organized originally.