TY - BOOK AU - Dougall, E. Graham ED - Proceedings of the IFIP ninth international conference on Information Security, IFIP/ Sec '93 TI - Computer security T2 - (Ifip transactions A ; SN - 0444817484 U1 - 005.8 20 PY - 1993/// CY - Toronto : PB - North Holland, KW - unescot KW - INFORMATICA KW - PROTECCION DE DATOS KW - ORDENADOR KW - SISTEMA INFORMATICO N1 - Kristian Beckman awards address : a view of information security tomorrow /; Harold Joseph Highland; p. 1-12; Openning keynote adress : the evolution of IT security convergence /; Patrick R. Gallagher, Jr; p. 13-22; Teaching security basics: the importance of when and how /; Viiveke Fák and Amund Hunstad; p. 23-30; The MSc in information security at Royal Holloway /; Dieter Gollmann; p. 31-36; Information security in the small systems context : a framework for understanding /; Guy G. Gable and Harold Joseph Higland; p. 37-52; Developing awareness, training and education : a cost effective tool for maintaining system integrity /; Corey D. Schou ; W. Vic Maconachy ; James Frost; p. 53-64; Teaching computer security /; Matt Bishop; p. 65-74; The filter model of information security : a conceptual model for education and training /; A. R. Smith; p. 75-90; Shamir's scheme says it all /; Ed Dawson ; Diane Donovan; p. 91-102; LUC: a new public key system /; Peter J. Smith ; Michael J. J. Lennon; p. 103-118; The encapsulated security services interface (ESSI) /; Ping Lin; p. 119-136; Context-dependent acess control in distributed systems /; Hemann Strack ; Kwok-Yan Lam; p. 137-156; Internal Control by objetives: the functional control matrix /; Karl H. Krueger; p. 157-170; International standards and organizational security needs: bridging the Gap /; C.J. Bosch ; J.H.P. Eloff ; J.M. Carroll; p. 171-184; The risk data repository : a novel approach to security risk modelling /; A.M. Anderson ; D. Longley ; A.B. Ticke; p. 185-194; Turning multiple evaluated products into trusted systems with asurance /; D. Gambel ; J. Fowler; p. 195-206; Historical labels in open distributed IT Systems : an ITSEC/ECMA specification /; Steward Kowalski; p. 207-226; A model for organising information security documentation /; L.M. du Toit ; S.H. von Solms; p. 227-242; Planning for the EDI of tomorrow using electronic document authorization /; S. Russell; p. 243-252; The EDP auditor: disappearing or adapting /; Guy. G. Gable ; Gordon B. Davis; p. 253-266; Electronic data interface (EDI) security and audito : a practical approach /; Ivan Ekebrink; p. 267-276; A generic security platform for workstations /; Björn Lindberg; p. 277-286; Evaluation of an academic programme in IT security 1985-1990 /; Louise Yngström; p. 287-300; Figthing the viruses : practical anti-virus training /; Mikael Larsson; p.301-312; A quantitative accreditation model- assessing the value of assurance /; M. Ohlin; p.313-326; Superseding manual generation of access control specification- from policies to profiles /; D. Pottas ; S. H. von Solms; p. 327-342; Extending the ISO access framework for multiple policies /; Marshall D. Abrams ; Michael V. Joyce; p. 343-358; Evolution of IT security in India - Implementation issues /; K. Subramanian; p. 359-368; Legal response to computer crime - Retrospect of a "Mere Chance" case /; Juhani Saari; p. 369-374; Information systems security and Fraud prevention in office automation systems /; Philip M. Stanley; p. 375-384; A process approach to information security management /; R. von Solms. ; S.H. von Solms ; J.M. Carroll; p. 385-400; MRA : A computational technique for security in High-Performance systems /; Mahdi Abdelguerfi ; Andrea Dunham ; Wayne Patterson; p. 401-417 ER -