| Preface | p. ix |
| IFIP/SEC2002 Conference Committees | p. xi |
| Information Security Management | |
| The Effective Implementation of Information Security in Organizations | p. 1 |
| A Practical Approach to Information Security Awareness in the Organization | p. 19 |
| RBAC Policies in XML for X.509 Based Privilege Management | p. 39 |
| A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration | p. 55 |
| Elaborating Quantitative Approaches for IT Security Evaluation | p. 67 |
| Standards of Information Security | |
| A Security Evaluation Criteria for Baseline Security Standards | p. 79 |
| Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects | p. 91 |
| For a Secure Mobile IP and Mobile IPv6 Deployment | p. 109 |
| Threats and Attacks to Information | |
| Addressing Internet Security Vulnerabilities: A Benchmarking Study | p. 121 |
| The Threat From Within - An Analysis of Attacks on an Internal Network | p. 133 |
| Security Vulnerabilities in Event-Driven Systems | p. 147 |
| Denial of Service: Another Example | p. 161 |
| A Detection Scheme for the SK Virus | p. 171 |
| Education and Curriculum for Information Security | |
| An Information Security Curriculum in Finland | p. 183 |
| Social and Ethical Aspects of Information Security | |
| Information Security Culture: The Socio-Cultural Dimension in Information Security Management | p. 191 |
| Information Security Culture | p. 203 |
| Information Security Services | |
| Keystroke Analysis as a Method of Advanced User Authentication and Response | p. 215 |
| Zero Knowledge Broadcasting Identification Scheme | p. 227 |
| A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services | p. 239 |
| Mandatory Security Policies for CORBA Security Model | p. 251 |
| Policap-Proposal, Development and Evaluation of a Policy Service and Capabilities for CORBA Security | p. 263 |
| Secure Database Connectivity on the WWW | p. 275 |
| Towards Semantic Integrity in Rational Database | p. 287 |
| Formal Design of Packet Filtering Systems | p. 299 |
| Elliptic Curve Cryptosystems on Smart Cards | p. 311 |
| Multilateral Security | |
| Establishing Bilateral Anonymous Communication in Open Networks | p. 323 |
| Applications of Information Security | |
| BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business | p. 335 |
| Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration | p. 347 |
| An Efficient Hybrid Sealed Bid Auction Protocol | p. 357 |
| Self-Determination in Mobile Internet: PiMI Prototype Results | p. 373 |
| Secure Component Distribution Using WebCom | p. 387 |
| E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals | p. 399 |
| An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions | p. 411 |
| Infrastructure for Information Security | |
| Secure Selective Exclusion in Ad Hoc Wireless Network | p. 423 |
| Advanced Topics in Security | |
| Optical Network Models for Quantum Cryptography | p. 435 |
| Legislation for Information Security | |
| A Unified Regulatory Framework on a European Information Society: Suggested Building Levels | p. 453 |
| Revisiting Legal and Regulatory Requirements for Secure E-Voting | p. 469 |
| Modeling and Analysis for Information Security | |
| A Security Incident Data Model | p. 481 |
| Security Levels for Contracting Agents | p. 495 |
| Functional Requirements for a Secure Electronic Voting System | p. 507 |
| Intelligent IP Packet Filtering | p. 521 |
| Tools for Information Security | |
| Human Computer Interaction: An Information Security Perspectives | p. 535 |
| A Very Smart Card for Fighting Against Terrorism | p. 547 |
| SHEDEL - A Simple Hierarchical Event Description Language for Specifying Attack Signatures | p. 559 |
| Propagating Modifications to Mobile Policies | p. 573 |
| Author Index | p. 585 |
| Table of Contents provided by Syndetics. All Rights Reserved. |