{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/AA11812783.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/AA11812783#entity","@type":"bibo:Journal","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/AA11812783.json"},"dc:title":[{"@value":"Proceedings of the ... ACM Conference on Computer and Communications Security"}],"dcterms:alternative":["ACM Workshop on Formal Methods in Security Engineering (FMSE)","CCS"],"dc:publisher":[{"@value":"Association for Computing Machinery"}],"dcterms:extent":"v.","cinii:size":"28 cm","dc:language":"eng","dc:date":"2000","cinii:ncid":"AA11812783","cinii:ownerCount":"2","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"ACM Conference on Computer and Communications Security"}]},{"@id":"https://ci.nii.ac.jp/author/DA08838681#entity","@type":"foaf:Person","foaf:name":[{"@value":"Association for Computing Machinery. Special Interest Group on Security, Audit, and Control"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA000106","@type":"foaf:Organization","foaf:name":"東京科学大学 大岡山図書館","rdfs:seeAlso":{"@id":"https://topics.libra.titech.ac.jp/recordID/catalog.bib/AA11812783"}},{"@id":"https://ci.nii.ac.jp/library/FA008516","@type":"foaf:Organization","foaf:name":"岡山理科大学 図書館"}],"bibo:lccn":["2001260002"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2001260002"}],"prism:publicationDate":["c2000-"],"cinii:note":["Sponsored by: ACM SIGSAC","Continues: ACM Conference on Computer and Communications Security. ACM Conference on Computer and Communications Security : [proceedings].","12th(2005) held in conjunction with the \"Third ACM Workshop on Formal Methods in Security Engineering (FMSE 2005)\""],"cinii:volumeYear":"7th (2000)-"}]}