Information systems security: facing the information society of the 21st century
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
London [u.a.]
Chapman & Hall
1996
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XII, 501 S. graph. Darst. |
ISBN: | 0412781204 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV011523247 | ||
003 | DE-604 | ||
005 | 20140204 | ||
007 | t | ||
008 | 970908s1996 d||| |||| 00||| eng d | ||
020 | |a 0412781204 |9 0-412-78120-4 | ||
035 | |a (OCoLC)34974529 | ||
035 | |a (DE-599)BVBBV011523247 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-91G | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 20 | |
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information systems security |b facing the information society of the 21st century |c ed. by Sokratis K. Katsikas ... |
250 | |a 1. ed. | ||
264 | 1 | |a London [u.a.] |b Chapman & Hall |c 1996 | |
300 | |a XII, 501 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computers - Security | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Data transmission systems |x Security measures |v Congresses | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Katsikas, Sōkratēs K. |d 1960- |e Sonstige |0 (DE-588)1047133342 |4 oth | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007754785&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-007754785 |
Datensatz im Suchindex
_version_ | 1804126043845427200 |
---|---|
adam_text | INFORMATION SYSTEMS SECURITY FACING THE INFORMATION SOCIETY OF THE 21 ST
CENTURY EDITED BY SOKRATIS K. KATSIKAS UNIVERSITY OF THE AEGEAN GREECE
AND DIMITRIS GRITZALIS ATHENS UNIVERSITY OF ECONOMICS AND BUSINESS
GREECE PUBLISHED BY CHAPMAN & HALL ON BEHALF OF THE INTERNATIONAL
FEDERATION FOR INFORMATION PROCESSING (IFIP) CHAPMAN & HALL LONDON *
WEINHEIM * NEW YORK * TOKYO * MELBOURNE * MADRAS CONTENTS IFIP SEC 96
CONFERENCE COMMITTEES IX PREFACE XI PART ONE SECURE INFORMATION SYSTEMS
I 1 1 A PRACTICAL SOLUTION TO THE COMPLEX HUMAN ISSUES OF INFORMATION
SECURITY DESIGN J. HILCHINGS 3 2 THE USE OF BUSTNESS PROCESS MODELS FOR
SECURITY DESIGN IN ORGANISATIONS R. HOLBEIN, S. TEUFEL AND K. BAUKNECHT
13 3 AN ANALYST S VIEW OF IS SECURITY E.A. KIOUNTOUZIS AND S.A.
KOKOLAKIS 23 PART TWO SECURITY IN MOBILE COMMUNICATIONS 37 4 LOCATION
NIANAGEMENT STIATEGICS INCREASING PRIVACY IN MOBILE COMMUNICATION D.
KESDOGAN, H. FEDERRATH, A. JERICHOW AND A. PFITZMANN 3 9 5 ID-BASED
AULHENTICATION FOR MOBILE CONFERENCE CALL S.-J. WANG, L.-P. CHIN, J.-F.
CHANG AND Y.-R. TSAI 49 PART THREE SECURE INFORMATION SYSTEMS II 59 6
NEW SECURITY PARADIGMS: ORTHODOXY AND HERESY H.H. HOSMER 61 7 SECURITY
ASSURANCE IN INFORMATION SYSTEMS R.G. WILSHER AND H. KURTH 74 8 A
FRAMEWORK FOR DEALING WITH AND SPECIFYING SECURITY REQUIREMENTS IN
INFORMATION SYSTEMS E. DUBAIS AND S. WU 88 9 THE EFFECTS OF LIME ON
INTEGRITY IN INFORMATION SYSTEMS W. LIST 100 PART FOUR MANAGEMENT AND
LEGAL ISSUES 109 10 EPHOS SECURITY: PROCUREMENT OF SECURE OPEN SYSTEMS
N.H. POPE UND J.G. ROSS 111 VI CONTENTS 11 CANADA S COMPUTER CRIME LAWS:
TEN YEARS OF EXPERIENCE M.P.J. KRATZ N L 12 DEUEVERY AND INSTALLATION
OF SOFTWARE: DISPUTES AND THE BUERDEN OF PROOF L. GOLVERS 142 PART FI VE
RISK AND SECURITY ASSESSMENT 151 13 INFORMATION SECURITY ON THE
ELECTRONIC SUPERHIGHWAY S.H. VON SOLMS I53 14 A TAXONOMY FOR ANALYZING
HAZARDS TO INFORMATION SYSTEMS R. BASKERVILLE J^7 15 MODELS AND TOOLS
FOR QUANTITATIVE ASSESSMENT OF OPERALIONAL SECURITY M, DACIER, Y.
DESWARTE ANDM. KAAENICHE 177 16 ACTIVATING DYNAMIC COUNTER MEASURES TO
REDUCC RISK L. LABUSCHAGNE ANDJ.H.P. ELOFF JG7 PARTSIX APPLIED
CRYPTOGRAPHY 597 17 DISTRIBUTED REGISTRATION AND KEY DISTRIBUTION (DIRK)
R. OPPLIGER AND A. ALBANESE JO.9 18 ON THE RECONSTRUETION OF SHARED
SECRETS J. HE AND E. DAWSON 209 19 A HIERARCHICAL THRESHOLD SCHEME WITH
UNIQUE PARTIAL KEYS H. HASSLER, V. HASSLER AND R. POSCH 219 20 EFFICIENT
AND PROVABLY SECURE KEY AGREEMENT N. ALCXANDRIS, M. BURMESTER, V.
CHRISSIKOPOULOS ANDD. PEPPES 227 21 INTERNETWORK ACCESS CONTROL USING
PUBLIC KEY CERTIFICATES H, PARK AND R. CHOW 237 PARTSEVEN DATABASE
SYSTEMS SECURITY 247 22 THE SECURITY ARCHITECTURE OF IRO-DB W. ESSMAYR,
F. KASTNER, G. PERNUL AND AM. TJOA 249 23 SECURELY EXECUTING MULTILEVEL
TRANSACTIONS S. JADODIA, K.P. SMITH, B.T. BLAUSTEM AND L. NOTARGIACOMO
259 24 A DECENTRALIZED TEMPORAL AULHORIZATION MODEL E. BERTINO, C.
BETTINI, E. FERRARI AND P. SAMARATI 271 PART EIGHT AUTHENTICATION AND
ACCESS CONTROL 28 1 25 APPLICATIONS OF KEYSTROKE ANALYSIS FOR IMPROVED
LOGIN SECURITY AND CONTINUOUS USER AUTHENTICATION SM. FURNELT, J.P.
MORRISSEY, P.W. SANDERS AND CT. STOCKE! 283 26 MOFAC: A MODEL FOR
FME-GRAINED ACCESS CONTROL J.S. VON SOLMS, M.S. OTIVIER AND S.H. VON
SOLMS 295 27 A DISCRETIONARY SECURITY MODEL FOR OBJEET ORIENTED
ENVIRONMENTS W.J. VAN RENSBURG AND M.S. OLIVIER 306 CONTENTS VII PART
NINK SYSTEMS AND TOOLS FOR INTRUSION PREVENTION AND DETECTION 317 28
INTENTION MODELLING: APPROXIMATING COMPUTER USCR INTENTIONS FOR
DETECTION AND PREDICTION OF INTRUSIONS T, SPYROU AND J, DARZENTAS 319 29
AN ATTACK DETECTION SYSTEM FOR SECURE COMPUTER SYSTEMS - DESIGN OF THE
ADS I. KANLZAVELOU AND A. PATEL 337 PART TEN SECURITY IN HEALTHCARE
SYSTEMS 349 30 JT SEEUNTY AND PRIVAEY EDUCATION L. YNGSTROEM 351 31 A
HUMAN APPROACH TO SECURITY MANAGEMENT IN HEALTH CARE //. JAMES, K.
ANDRONIS AND W. PAUL 365 32 SECURITY ENFORCEMENT IN A EUROPEAN MEDICAL
DEVICE VIGILANCE SYSTEM NETWORK G. VASSILACOPOULOS, V, CHRISSIKOPOULO.I
AND D. PEPPES 377 33 DESIGN OF SECURE MEDICA] DATABASE SYSTEMS G.
PANGALOS AND M. KHAIR 387 PART ELEVEN NETWORK AND DISTRIBUTED SYSTEMS
SECURITY 403 34 EVALUATION OF THE SECURITY OF DISTRIBUTED IT SYSTEMS
THROUGH ITSEC/1TSEM: EXPERIENCES AND FINDINGS /. UTTRIDGE, G. BAZZAIUI,
M. GIUNCHI, G. DELER, S. GEYRES AND J. HEILER 405 35 SNMP-BASED NETWORK
SECURITY MANAGEMENT USING A TEMPORAL DATABASE APPROACH T.K.
APOSTOLOPOULOS, VC. DASKALOU 417 36 SECURITY PROFILE FOR INTERCONNECTED
OPEN DISTRIBUTED SYSTEMS WITH VARYING VULNERABILITY N. NIKITAKOS, S.
GRITZALIS AND R GEORGIADIS 428 37 A MODEL FOR THE DETECTION OF THE
MESSAGE STREAM DELAY ATTACK S. O CONNELL AND A. PATEL 43G 38 SECURITY
MODEL FOR DISTRIBUTED OBJCCT FRAMEWORK AND ITS APPLICABILITY TO CORBA V.
VARADHARAJAN AND T. HARDJONO 452 PART TWELVE PROJECT SESSION: INVITED
TALK 465 39 SOFTWAI E QUALITY ASSURANCC: THE UNDERLYING FRAMEWORK FOR
ACHIEVING SECURE AND RCLIABLE SOFTWARE SYSTEMS S.A. FRANGOS 467 PART
THIRTEEN POSTER SESSION 475 40 CONFIGURATION MANAGEMENT - A BASIS OF THE
HIGH ASSURANCE SOFTWARE ENGINEERING PROCESS T. GAST AND K. KENS 477 VLLL
CONTENTS 41 MULTI-PURPOSE SECURILY MODULE BASED ON SMART CARDS E.
DELACOUR 480 42 AN AULHENLICALION SERVICE SUPPORTING DOMAIN-BASED ACCESS
CONTROL POLICIES N. YIALELIS AND M. SLOMATI 482 43 ON SECURILY MODEIS C.
ECKERT 485 44 RISKS ON THE WAY LO IHE GLOBAL INFORMATION SOCIETY 5 .
FISCHER-HUEBNER AND K. SCHIER 487 45 CRYPLO MANAGER: AN OBJEET ORIENTED
SOFTWARE LIBRARY FOR CRYPTOGRAPHIC MECHANISMS T. BALDIN AND G. BLEUTNER
489 46 CRYPTOGRAPHIC KEY DISTRIBUTION AND AUTHENTICATION PROTOCOLS FOR
SECURE GROUP COMMUNICATION A.C.M. HUTCHISON AND K. BAUKNECHT 492 47 A
NEW HYBRID ENCRYPTION SCHEINE FOR COMPUTER NETWORKS M.T. EL-HADIDI, N.H.
HEGAZI AND H.K. ASLAN 494 48 FRORA ZCRO4;NOWLEDGE LO A PRACTICAL
AUTHENTICATION PROTOEOL V. MATYAES JR. 496 INDEX F CONTRIBUTORS 498
KEYWORD INDEX 499
|
any_adam_object | 1 |
author_GND | (DE-588)1047133342 |
building | Verbundindex |
bvnumber | BV011523247 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)34974529 (DE-599)BVBBV011523247 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01382nam a2200361 c 4500</leader><controlfield tag="001">BV011523247</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140204 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">970908s1996 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0412781204</subfield><subfield code="9">0-412-78120-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)34974529</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV011523247</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information systems security</subfield><subfield code="b">facing the information society of the 21st century</subfield><subfield code="c">ed. by Sokratis K. Katsikas ...</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London [u.a.]</subfield><subfield code="b">Chapman & Hall</subfield><subfield code="c">1996</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 501 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers - Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katsikas, Sōkratēs K.</subfield><subfield code="d">1960-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1047133342</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007754785&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007754785</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV011523247 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:11:11Z |
institution | BVB |
isbn | 0412781204 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-007754785 |
oclc_num | 34974529 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | XII, 501 S. graph. Darst. |
publishDate | 1996 |
publishDateSearch | 1996 |
publishDateSort | 1996 |
publisher | Chapman & Hall |
record_format | marc |
spelling | Information systems security facing the information society of the 21st century ed. by Sokratis K. Katsikas ... 1. ed. London [u.a.] Chapman & Hall 1996 XII, 501 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computers - Security Computer security Congresses Data transmission systems Security measures Congresses (DE-588)1071861417 Konferenzschrift gnd-content Katsikas, Sōkratēs K. 1960- Sonstige (DE-588)1047133342 oth GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007754785&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information systems security facing the information society of the 21st century Computers - Security Computer security Congresses Data transmission systems Security measures Congresses |
subject_GND | (DE-588)1071861417 |
title | Information systems security facing the information society of the 21st century |
title_auth | Information systems security facing the information society of the 21st century |
title_exact_search | Information systems security facing the information society of the 21st century |
title_full | Information systems security facing the information society of the 21st century ed. by Sokratis K. Katsikas ... |
title_fullStr | Information systems security facing the information society of the 21st century ed. by Sokratis K. Katsikas ... |
title_full_unstemmed | Information systems security facing the information society of the 21st century ed. by Sokratis K. Katsikas ... |
title_short | Information systems security |
title_sort | information systems security facing the information society of the 21st century |
title_sub | facing the information society of the 21st century |
topic | Computers - Security Computer security Congresses Data transmission systems Security measures Congresses |
topic_facet | Computers - Security Computer security Congresses Data transmission systems Security measures Congresses Konferenzschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007754785&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT katsikassokratesk informationsystemssecurityfacingtheinformationsocietyofthe21stcentury |