+612 9045 4394
 
CHECKOUT
Information Security : The Next Decade :  The Next Decade - Jan H. P. Eloff

Information Security : The Next Decade

The Next Decade

By: Jan H. P. Eloff (Editor), Sebastiaan H. von Solms (Editor)

Hardcover

Published: December 2009
Ships: 7 to 10 business days
7 to 10 business days
RRP $975.99
$675.95
31%
OFF
or 4 easy payments of $168.99 with Learn more

These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented covering a wide range of subjects including current industry expectations and current research aspects. The evolutionary development of information security as a professional and research discipline was discussed along with security in open distributed systems and security in groupware.

Security should pay: it should not costp. 3
Improving the security of medical database systemsp. 11
Security within financial information systemsp. 26
Common criteria for IT security evaluation - update reportp. 41
Information security accreditation - the ISO 9000 routep. 50
Encryption policy for the Global Information Infrastructurep. 63
An object-oriented approach to an IT risk management systemp. 79
Systematic approach to security risk investigationp. 87
A holistic approach to IT securityp. 98
Analysis of DES double key modep. 113
Meta-multisignature schemes based on the discrete logarithm problemp. 128
Information security issues in mobile computingp. 143
A new framework for information security to avoid information anarchyp. 155
A practical conference key distribution systemp. 167
A LAN voting protocolp. 176
Security in group applications: Lotus notes as case studyp. 190
Auctioning by satellite using trusted third party security servicesp. 205
Experience in application of composable security propertiesp. 223
Matching security policies to application needsp. 237
A methodology for the development of secure application systemsp. 255
A context authentication service for role based access control in distributed systems CARDSp. 270
Functional and operational security system for open distributed environmentsp. 289
Distributed object system securityp. 305
Creating security applications based on the Global Certificate Management Systemp. 322
Extending distributed audit to heterogenous audit subsystemsp. 331
Data protection communications and storagep. 340
Handling imprecise information in risk managementp. 357
Achieving an integrated design: the way forward for information securityp. 369
A day in the life of a Swedish IT Security Officer: an attempt at an empirical studyp. 384
Security management in a distributed open environmentp. 396
TeleSeC a solution to implementing digital signature in EDI/EDIFACTp. 409
On paradigms for security policies in multipolicy environmentsp. 421
Key management and the security of management in open systems: the SAMSON prototypep. 436
A classification of health information systems security flawsp. 453
Developing policies, procedures and information security systemsp. 465
Aligning information security profiles with organizational policiesp. 477
Viruses, corruption, denial, disruption and information assurancep. 495
A framework for access control modelsp. 513
LTTP protection - pragmatic approach to licensingp. 534
Detecting intrusions in smart card applications using expert systems and neural networksp. 549
Reinforcing password authentication with typing biometricsp. 562
Portrait of the computer criminalp. 577
Comprehensive Information Technology security: a new approach to respond to ethical and social issues surrounding information security in the 21st Centuryp. 590
Ethical information security in a cross-cultural environmentalp. 603
From social requirements to technical solutions - bridging the gap with user-oriented data securityp. 612
Appendix A: Swedish Workshop: "Security on the electronic highways in Sweden"p. 624
Appendix B: Work Groups at IFIP/Sec '95p. 624
Index of contributorsp. 625
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9780412640209
ISBN-10: 0412640201
Series: IFIP Advances in Information and Communication Technology
Audience: Professional
Format: Hardcover
Language: English
Number Of Pages: 625
Published: December 2009
Publisher: Chapman and Hall
Country of Publication: GB
Dimensions (cm): 23.5 x 15.5  x 3.4
Weight (kg): 2.34