Proceedings of the IFIP TC11 13th international conference on Information Security (SEC 97): 1416 May 1997, Copenhagen, Denmark
De som köpt den här boken har ofta också köpt Co-Intelligence av Ethan Mollick (häftad).
Köp båda 2 för 3249 krThis book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIPISEC 2006) on "Security and Privacy in Dynamic Envir- ments" held in May 22-24 2006 in Karlstad, Sweden. The first IFIPISEC conf...
1 Information security challenges for the next millenium.- 2 Selection of secure single sign-on solutions for heterogeneous computing environments.- 3 A formal model to aid documenting and harmonizing of information security requirements.- 4 A compile-time model for safe information flow in object-oriented databases.- 5 Deriving Authorizations from Process Analysis in Legacy Information Systems.- 6 The Role of Government in Creating the IT Security Infrastructure: Builder or Bystander?.- 7 Code of Practice: A Standard for Information Security Management.- 8 Can security baselines replace risk analysis?.- 9 gGSS-API: a group enhanced generic security service.- 10 Electronic document exchange in Sweden the legal aspects.- 11 An attack detection system for secure computer systems outline of the solution.- 12 A taxonomy and overview of information security experiments.- 13 Pseudonymous audit for privacy enhanced intrusion detection.- 14 Individual management of personal reachability in mobile communication.- 15 New vistas on info-system security.- 16 A common criteria framework for the evaluation of information technology systems security.- 17 A methodology for accrediting a commercial distributed database.- 18 A comparison of schemes for certification authorities/trusted third parties.- 19 How to trust systems.- 20 Integrating information security in the development of telematics systems.- 21 Developing secure applications: a systematic approach.- 22 Controlling Internet access at an educational institution.- 23 Analysis of Java security and hostile applets.- 24 New organizational forms for information security management.- 25 Security when outsourcing: concepts, constructs, compliance.- 26 The IFIP TC11 position on cryptopolicies.- 27 Towards an holistic viewof enterprise ICT security and safety.- 28 A taxonomy of electronic cash schemes.- 29 Large scale elections by coordinating electoral colleges.- 30 MVS-SAT: a security administration tool to support SMF protocol data evaluation.- 31 security requirements and solutions in distributed electronic health records.- 32 ODESSA a new approach to healthcare risk analysis.- 33 A comprehensive need-to-know access control system and its application for medical information systems.- 34 The future of networks and network security.- 35 Securing communications over ATM networks.- 36 Non-intrusive authentication.- 37 Roaming security agents enabling intelligent access control and network protection.- Index of contributors.- Keyword index.