Information security - the next decade: proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
London [u.a.]
Chapman & Hall
1995
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VIII, 623 S. |
ISBN: | 0412640201 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV012456950 | ||
003 | DE-604 | ||
005 | 19990609 | ||
007 | t | ||
008 | 990316s1995 |||| 10||| eng d | ||
020 | |a 0412640201 |9 0-412-64020-1 | ||
035 | |a (OCoLC)32738760 | ||
035 | |a (DE-599)BVBBV012456950 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-91G | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 20 | |
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information security - the next decade |b proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95 |c ed. by Jan H. P. Eloff ... |
250 | |a 1. ed. | ||
264 | 1 | |a London [u.a.] |b Chapman & Hall |c 1995 | |
300 | |a VIII, 623 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computers - Security | |
650 | 4 | |a Computer networks |x Security measures |v Congresses | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 4 | |a Database security |v Congresses | |
650 | 4 | |a Electronic data processing departments |x Security measures |v Congresses | |
650 | 4 | |a Records |x Access control |v Congresses | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Eloff, Jan H. |e Sonstige |4 oth | |
711 | 2 | |a International Conference on Information Security |n 11 |d 1995 |c Kapstadt |j Sonstige |0 (DE-588)5156837-8 |4 oth | |
856 | 4 | 2 | |m Digitalisierung TU Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008453210&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-008453210 |
Datensatz im Suchindex
_version_ | 1804127095509483520 |
---|---|
adam_text | CONTENTS
Invited
Talki
1
Security should pay: it should not cost
W.H. Murray
3
PART ONE Information Security and Business Applications
1
2
Improving the security of medical database systems
G.
Pángalos,
D.
Gritzalis,
M.
Khair and
L
Bozios
11
3
Security within financial information systems
W.
de Koning
26
PART TWO Information Security Standards
4
Common criteria for IT security evaluation
-
update report
P. Overbeek
41
5
Information security accreditation
-
the ISO
9000
route
R.
von
Solms and LR. Meyer
5 0
Invited Talk
2
6
Encryption policy for the Global Information Infrastructure
LJ. Hoffman
63
PART THREE Management of Information Security
1
7
An object-oriented approach to an IT risk management system
G. Wahlgren
79
8
Systematic approach to security risk investigation
D.P. Jokanovic
87
9
A holistic approach to IT security
L.
Yngström
98
PART FOUR Cryptography, Key Management Schemes and Mobile Computing
10
Analysis of
DES
double key mode
G. Carter, A. Clark, E. Dawson and
L
Nielsen
113
11
Meta-multisignature schemes based on the discrete logarithm problem
P. Horsier, M.
Michels
and H. Peterson
128
12
Information security issues in mobile computing
T. Hardjano and J. Seberry
143
vi
Contents
Invited Talk
3
13
A new framework for information security to avoid information anarchy
D.B. Parker
155
PART FIVE Information Security and Groupware
14
A practical conference key distribution system
V. Chrissikopoulos and D. Peppes
167
15
A LAN voting protocol
V.
Hassler
and R.
Posch 176
16
Security in group applications: Lotus notes as case study
A.Hutchinson
190
17
Auctioning by satellite using trusted third party security services
P. Sanders, S. Rhodes and
A. Patel
205
PART SIX Building Secure Applications
18
Experience in application of composable security properties
N.
Zhang amd Q.Shi
223
19
Matching security policies to application needs
С
Eckert 237
20
A methodology for the development of secure application systems
HAS. Booysen and J.H.P. Eloff
255
21
A context authentication service for role based access control in
distributed systems CARDS
R. Holbein and S.
Teufel 270
Invited Talk
4
22
Functional and operational security system for open distributed environments
5.
Mufiic
289
PART SEVEN Open Distributed Security
1
23
Distributed object system security
V. Varadharajan
305
24
Creating security applications based on the Global Certificate Management
System
N.Kapidzic
322
25
Extending distributed audit to heterogeneous audit subsystems
C.R.Tsai
331
26
Data protection in communications and storage
P. Kaijser
340
PART EIGHT Management of Information Security
2
27
Handling imprecise information in risk management
L
Ekenberg
and
M.
Danielson
357
Contents
vii
28
Achieving an integrated design: the way forward for information security
J. Hit chins
369
29
A day in the life of a Swedish IT Security Officer: an attempt at an empirical study
5. Kowalski 384
30
Security management in a distributed open environment
M.
Caliti,
R.
von
Solms and
S.H.
von Solms 396
PART NINE Open Distributed Security
2
31
TeleSeC
-
a solution to implementing digital signature in EDI/EDIFACT
P. Fjelbye
409
32
On paradigms for security policies in multipolicy environments
W.E. Kühnhauser 421
33
Key management and the security of management in open systems:
the SAMSON prototype
G. Endersz and R. Xamparo
436
PART TEN Information Security and Business Applications
2
34
A classification of health information systems security flaws
D. Gritzalis, I. Kantzavelou, S. Katsikas and
A. Patel
453
35
Developing policies, procedures and information security systems
A.R.
Warman
465
36
Aligning information security profiles with organizational policies
D. Pottos and S.H.
von
Solms
477
Invited Talk
5
37
Viruses, corruption, denial, disruption and information assurance
F.B. Cohen
495
PART ELEVEN Access Control
38
A framework for access control models
B.Lau
513
39
LTTP protection
-
a pragmatic approach to licensing
R.
Hauser
and K.
Bauknecht 534
40
Detecting intrusions in smart card applications using expert systems and
neural networks
T.
Alexandre
and P.
Trane 549
41
Reinforcing password authentication with typing biometrics
W.
G. de Ru
and
J. H. P. Eloff
562
PART TWELVE Legal, Ethical and Social Issues of Information Security
42
Portrait of the computer criminal
J.M.Carroll
577
viii Contents
43
Comprehensive Information Technology
security: a new approach to
respond to ethical and social issues surrounding information security
in the 21st Century
A.
Hartman 590
44
Ethical information security in a cross-cultural environment
K.L· Nance and M. Strohmaier
603
45
From social requirements to technical solutions
-
bridging the gap with
user-oriented data security
U.Kohl
612
Appendix A
:
Swedish Workshop: Security on the electronic highways in Sweden
624
Appendix
В
:
Work Groups at IFIP/Sec^S
624
Index of contributors
625
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV012456950 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)32738760 (DE-599)BVBBV012456950 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed. |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01744nam a2200421 c 4500</leader><controlfield tag="001">BV012456950</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">19990609 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">990316s1995 |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0412640201</subfield><subfield code="9">0-412-64020-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)32738760</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV012456950</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security - the next decade</subfield><subfield code="b">proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95</subfield><subfield code="c">ed. by Jan H. P. Eloff ...</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London [u.a.]</subfield><subfield code="b">Chapman & Hall</subfield><subfield code="c">1995</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 623 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers - Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Records</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Eloff, Jan H.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Conference on Information Security</subfield><subfield code="n">11</subfield><subfield code="d">1995</subfield><subfield code="c">Kapstadt</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)5156837-8</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung TU Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008453210&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-008453210</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV012456950 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T18:27:54Z |
institution | BVB |
institution_GND | (DE-588)5156837-8 |
isbn | 0412640201 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-008453210 |
oclc_num | 32738760 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | VIII, 623 S. |
publishDate | 1995 |
publishDateSearch | 1995 |
publishDateSort | 1995 |
publisher | Chapman & Hall |
record_format | marc |
spelling | Information security - the next decade proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95 ed. by Jan H. P. Eloff ... 1. ed. London [u.a.] Chapman & Hall 1995 VIII, 623 S. txt rdacontent n rdamedia nc rdacarrier Computers - Security Computer networks Security measures Congresses Computer security Congresses Computers Access control Congresses Database security Congresses Electronic data processing departments Security measures Congresses Records Access control Congresses (DE-588)1071861417 Konferenzschrift gnd-content Eloff, Jan H. Sonstige oth International Conference on Information Security 11 1995 Kapstadt Sonstige (DE-588)5156837-8 oth Digitalisierung TU Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008453210&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information security - the next decade proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95 Computers - Security Computer networks Security measures Congresses Computer security Congresses Computers Access control Congresses Database security Congresses Electronic data processing departments Security measures Congresses Records Access control Congresses |
subject_GND | (DE-588)1071861417 |
title | Information security - the next decade proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95 |
title_auth | Information security - the next decade proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95 |
title_exact_search | Information security - the next decade proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95 |
title_full | Information security - the next decade proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95 ed. by Jan H. P. Eloff ... |
title_fullStr | Information security - the next decade proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95 ed. by Jan H. P. Eloff ... |
title_full_unstemmed | Information security - the next decade proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95 ed. by Jan H. P. Eloff ... |
title_short | Information security - the next decade |
title_sort | information security the next decade proceedings of the ifip tc11 eleventh international conference on information security ifip sec 95 |
title_sub | proceedings of the IFIP TC11 eleventh International Conference on Information Security, IFIP/Sec '95 |
topic | Computers - Security Computer networks Security measures Congresses Computer security Congresses Computers Access control Congresses Database security Congresses Electronic data processing departments Security measures Congresses Records Access control Congresses |
topic_facet | Computers - Security Computer networks Security measures Congresses Computer security Congresses Computers Access control Congresses Database security Congresses Electronic data processing departments Security measures Congresses Records Access control Congresses Konferenzschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008453210&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT eloffjanh informationsecuritythenextdecadeproceedingsoftheifiptc11eleventhinternationalconferenceoninformationsecurityifipsec95 AT internationalconferenceoninformationsecuritykapstadt informationsecuritythenextdecadeproceedingsoftheifiptc11eleventhinternationalconferenceoninformationsecurityifipsec95 |