Computer security
Computer security
Proceedings of the IFIP ninth international conference on Information Security, IFIP/ Sec '93 ; edición, E. Graham Dougall
- Toronto : North Holland, 1993.
- 417 p. ; il. ; tablas ; gráfs. ; 23 cm.
- (Ifip transactions A ; 37) .
Kristian Beckman awards address : a view of information security tomorrow / Harold Joseph Highland. p. 1-12. Openning keynote adress : the evolution of IT security convergence / Patrick R. Gallagher, Jr. p. 13-22. Teaching security basics: the importance of when and how / Viiveke Fák and Amund Hunstad. p. 23-30. The MSc in information security at Royal Holloway / Dieter Gollmann. p. 31-36. Information security in the small systems context : a framework for understanding / Guy G. Gable and Harold Joseph Higland. p. 37-52. Developing awareness, training and education : a cost effective tool for maintaining system integrity / Corey D. Schou ; W. Vic Maconachy ; James Frost. p. 53-64. Teaching computer security / Matt Bishop p. 65-74 The filter model of information security : a conceptual model for education and training / A. R. Smith p. 75-90. Shamir's scheme says it all / Ed Dawson ; Diane Donovan. p. 91-102. LUC: a new public key system / Peter J. Smith ; Michael J. J. Lennon. p. 103-118. The encapsulated security services interface (ESSI) / Ping Lin. p. 119-136 Context-dependent acess control in distributed systems / Hemann Strack ; Kwok-Yan Lam. p. 137-156. Internal Control by objetives: the functional control matrix / Karl H. Krueger. p. 157-170. International standards and organizational security needs: bridging the Gap / C.J. Bosch ; J.H.P. Eloff ; J.M. Carroll. p. 171-184. The risk data repository : a novel approach to security risk modelling / A.M. Anderson ; D. Longley ; A.B. Ticke. p. 185-194. Turning multiple evaluated products into trusted systems with asurance / D. Gambel ; J. Fowler. p. 195-206. Historical labels in open distributed IT Systems : an ITSEC/ECMA specification / Steward Kowalski. p. 207-226. A model for organising information security documentation / L.M. du Toit ; S.H. von Solms. p. 227-242. Planning for the EDI of tomorrow using electronic document authorization / S. Russell. p. 243-252. The EDP auditor: disappearing or adapting / Guy. G. Gable ; Gordon B. Davis. p. 253-266. Electronic data interface (EDI) security and audito : a practical approach / Ivan Ekebrink p. 267-276. A generic security platform for workstations / Björn Lindberg. p. 277-286. Evaluation of an academic programme in IT security 1985-1990 / Louise Yngström. p. 287-300. Figthing the viruses : practical anti-virus training / Mikael Larsson. p.301-312. A quantitative accreditation model- assessing the value of assurance / M. Ohlin. p.313-326. Superseding manual generation of access control specification- from policies to profiles / D. Pottas ; S. H. von Solms. p. 327-342. Extending the ISO access framework for multiple policies / Marshall D. Abrams ; Michael V. Joyce. p. 343-358. Evolution of IT security in India - Implementation issues / K. Subramanian. p. 359-368. Legal response to computer crime - Retrospect of a "Mere Chance" case / Juhani Saari. p. 369-374. Information systems security and Fraud prevention in office automation systems / Philip M. Stanley. p. 375-384. A process approach to information security management / R. von Solms. ; S.H. von Solms ; J.M. Carroll. p. 385-400. MRA : A computational technique for security in High-Performance systems / Mahdi Abdelguerfi ; Andrea Dunham ; Wayne Patterson. p. 401-417.
0444817484
INFORMATICA
PROTECCION DE DATOS
ORDENADOR
SISTEMA INFORMATICO
005.8 / PROC 963
Kristian Beckman awards address : a view of information security tomorrow / Harold Joseph Highland. p. 1-12. Openning keynote adress : the evolution of IT security convergence / Patrick R. Gallagher, Jr. p. 13-22. Teaching security basics: the importance of when and how / Viiveke Fák and Amund Hunstad. p. 23-30. The MSc in information security at Royal Holloway / Dieter Gollmann. p. 31-36. Information security in the small systems context : a framework for understanding / Guy G. Gable and Harold Joseph Higland. p. 37-52. Developing awareness, training and education : a cost effective tool for maintaining system integrity / Corey D. Schou ; W. Vic Maconachy ; James Frost. p. 53-64. Teaching computer security / Matt Bishop p. 65-74 The filter model of information security : a conceptual model for education and training / A. R. Smith p. 75-90. Shamir's scheme says it all / Ed Dawson ; Diane Donovan. p. 91-102. LUC: a new public key system / Peter J. Smith ; Michael J. J. Lennon. p. 103-118. The encapsulated security services interface (ESSI) / Ping Lin. p. 119-136 Context-dependent acess control in distributed systems / Hemann Strack ; Kwok-Yan Lam. p. 137-156. Internal Control by objetives: the functional control matrix / Karl H. Krueger. p. 157-170. International standards and organizational security needs: bridging the Gap / C.J. Bosch ; J.H.P. Eloff ; J.M. Carroll. p. 171-184. The risk data repository : a novel approach to security risk modelling / A.M. Anderson ; D. Longley ; A.B. Ticke. p. 185-194. Turning multiple evaluated products into trusted systems with asurance / D. Gambel ; J. Fowler. p. 195-206. Historical labels in open distributed IT Systems : an ITSEC/ECMA specification / Steward Kowalski. p. 207-226. A model for organising information security documentation / L.M. du Toit ; S.H. von Solms. p. 227-242. Planning for the EDI of tomorrow using electronic document authorization / S. Russell. p. 243-252. The EDP auditor: disappearing or adapting / Guy. G. Gable ; Gordon B. Davis. p. 253-266. Electronic data interface (EDI) security and audito : a practical approach / Ivan Ekebrink p. 267-276. A generic security platform for workstations / Björn Lindberg. p. 277-286. Evaluation of an academic programme in IT security 1985-1990 / Louise Yngström. p. 287-300. Figthing the viruses : practical anti-virus training / Mikael Larsson. p.301-312. A quantitative accreditation model- assessing the value of assurance / M. Ohlin. p.313-326. Superseding manual generation of access control specification- from policies to profiles / D. Pottas ; S. H. von Solms. p. 327-342. Extending the ISO access framework for multiple policies / Marshall D. Abrams ; Michael V. Joyce. p. 343-358. Evolution of IT security in India - Implementation issues / K. Subramanian. p. 359-368. Legal response to computer crime - Retrospect of a "Mere Chance" case / Juhani Saari. p. 369-374. Information systems security and Fraud prevention in office automation systems / Philip M. Stanley. p. 375-384. A process approach to information security management / R. von Solms. ; S.H. von Solms ; J.M. Carroll. p. 385-400. MRA : A computational technique for security in High-Performance systems / Mahdi Abdelguerfi ; Andrea Dunham ; Wayne Patterson. p. 401-417.
0444817484
INFORMATICA
PROTECCION DE DATOS
ORDENADOR
SISTEMA INFORMATICO
005.8 / PROC 963