+612 9045 4394
 
CHECKOUT
Information Systems Security : Facing the information society of the 21st century - Sokratis Katsikas

Information Systems Security

Facing the information society of the 21st century

By: Sokratis Katsikas (Editor)

Hardcover

Published: 31st May 1996
Ships: 7 to 10 business days
7 to 10 business days
RRP $858.99
$594.50
31%
OFF
or 4 easy payments of $148.63 with Learn more
if ordered within

This volume presents a review of current perspectives in information systems security in view of the information society of the 21st century. Information security requirements are thoroughly examined from research, industrial and practical viewpoints. Some of the major topics discussed include: information and communication systems security; management of information security; network and distributed systems security; applications of cryptography; legal, ethical and social issues of information security; formal models for information security; standardization, certification and accrediatation issues; privacy issues in the information society; and intrusion detection systems. The book contains the selected proceedings of the 12th International Information Security Conference, arranged by the International Federational for Information Processing and held in Samos, Greece, in May 1996. It should be useful reading for information technology security specialists, computer professionals, EDP managers, EDP auditors, managers, researchers and students working on the subject.

IFIP SEC'96 Conference Committees
Preface
A practical solution to the complex human issues of information security designp. 3
The use of business process models for security design in organisationsp. 13
An analyst's view of IS securityp. 23
Location management strategies increasing privacy in mobile communicationp. 39
ID-based authentication for mobile conference callp. 49
New security paradigms: orthodoxy and heresyp. 61
Security assurance in information systemsp. 74
A framework for dealing with and specifying security requirements in information systemsp. 88
The effects of time on integrity in information systemsp. 100
EPHOS security: procurement of secure open systemsp. 111
Canada's computer crime laws: ten years of experiencep. 122
Delivery and installation of software: disputes and the burden of proofp. 142
Information security on the electronic superhighwayp. 153
A taxonomy for analyzing hazards to information systemsp. 167
Models and tools for quantitative assessment of operational securityp. 177
Activating dynamic counter measures to reduce riskp. 187
Distributed registration and key distribution (DiRK)p. 199
On the reconstruction of shared secretsp. 209
A hierarchical threshold scheme with unique partial keysp. 219
Efficient and provably secure key agreementp. 227
Internetwork access control using public key certificatesp. 237
The security architecture of IRO-DBp. 249
Securely executing multilevel transactionsp. 259
A decentralized temporal authorization modelp. 271
Applications of keystroke analysis for improved login security and continuous user authenticationp. 283
MoFAC: a model for fine-grained access controlp. 295
A discretionary security model for object oriented environmentsp. 306
Intention modelling: approximating computer user intentions for detection and prediction of intrusionsp. 319
An attack detection system for secure computer systems - design of the ADSp. 337
IT security and privacy educationp. 351
A human approach to security management in health carep. 365
Security enforcement in a European medical device vigilance system networkp. 377
Design of secure medical database systemsp. 387
Evaluation of the security of distributed IT systems through ITSEC/ITSEM: experiences and findingsp. 405
SNMP-based network security management using a temporal database approachp. 417
Security profile for interconnected open distributed systems with varying vulnerabilityp. 428
A model for the detection of the message stream delay attackp. 438
Security model for distributed object framework and its applicability to CORBAp. 452
Software quality assurance: the underlying framework for achieving secure and reliable software systemsp. 467
Configuration management - a basis of the high assurance software engineering processp. 477
Multi-purpose security module based on smart cardsp. 480
An authentication service supporting domain-based access control policiesp. 482
On security modelsp. 485
Risks on the way to the global information societyp. 487
Crypto Manager: an object oriented software library for cryptographic mechanismsp. 489
Cryptographic key distribution and authentication protocols for secure group communicationp. 492
A new hybrid encryption scheme for computer networksp. 494
From zero-knowledge to a practical authentication protocolp. 496
Index of contributorsp. 498
Keyword indexp. 499
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9780412781209
ISBN-10: 0412781204
Series: IFIP Advances in Information and Communication Technology
Audience: Professional
Format: Hardcover
Language: English
Number Of Pages: 501
Published: 31st May 1996
Publisher: Chapman and Hall
Country of Publication: GB
Dimensions (cm): 23.5 x 15.5  x 2.54
Weight (kg): 1.98