Document Type
|
:
|
BL
|
Record Number
|
:
|
721770
|
Doc. No
|
:
|
b541478
|
Main Entry
|
:
|
edited by Louise Yngström, Jan Carlsen.
|
Title & Author
|
:
|
Information security in research and business : : Proceedings of the IFIP TC11 13th international conference on Information Security (SEC '97): 14-16 May 1997, Copenhagen, Denmark\ edited by Louise Yngström, Jan Carlsen.
|
Publication Statement
|
:
|
Dordrecht: Springer, 1997
|
Series Statement
|
:
|
International Federation for Information Processing (Series)
|
Page. NO
|
:
|
(xii, 472 pages)
|
ISBN
|
:
|
0387352597
|
|
:
|
: 9780387352596
|
Notes
|
:
|
Originally published by Chapman & Hall in 1997.;International conference proceedings.;Includes indexes.
|
Contents
|
:
|
1 Information security --;challenges for the next millenium --;2 Selection of secure single sign-on solutions for heterogeneous computing environments --;3 A formal model to aid documenting and harmonizing of information security requirements --;4 A compile-time model for safe information flow in object-oriented databases --;5 Deriving Authorizations from Process Analysis in Legacy Information Systems --;6 The Role of Government in Creating the IT Security Infrastructure: Builder or Bystander? --;7 Code of Practice: A Standard for Information Security Management --;8 Can security baselines replace risk analysis? --;9 gGSS-API: a group enhanced generic security service --;10 Electronic document exchange in Sweden --;the legal aspects --;11 An attack detection system for secure computer systems --;outline of the solution --;12 A taxonomy and overview of information security experiments --;13 Pseudonymous audit for privacy enhanced intrusion detection --;14 Individual management of personal reachability in mobile communication --;15 New vistas on info-system security --;16 A common criteria framework for the evaluation of information technology systems security --;17 A methodology for accrediting a commercial distributed database --;18 A comparison of schemes for certification authorities/trusted third parties --;19 How to trust systems --;20 Integrating information security in the development of telematics systems --;21 Developing secure applications: a systematic approach --;22 Controlling Internet access at an educational institution --;23 Analysis of Java security and hostile applets --;24 New organizational forms for information security management --;25 Security when outsourcing: concepts, constructs, compliance --;26 The IFIP TC11 position on cryptopolicies --;27 Towards an holistic view of enterprise ICT security and safety --;28 A taxonomy of electronic cash schemes --;29 Large scale elections by coordinating electoral colleges --;30 MVS-SAT: a security administration tool to support SMF protocol data evaluation --;31 security requirements and solutions in distributed electronic health records --;32 ODESSA --;a new approach to healthcare risk analysis --;33 A comprehensive need-to-know access control system and its application for medical information systems --;34 The future of networks and network security --;35 Securing communications over ATM networks --;36 Non-intrusive authentication --;37 Roaming security agents enabling intelligent access control and network protection --;Index of contributors --;Keyword index.
|
Abstract
|
:
|
Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC '97): 14-16 May 1997, Copenhagen, Denmark
|
Subject
|
:
|
Business -- Data processing -- Security measures -- Congresses.
|
Subject
|
:
|
Business -- Data processing -- Security measures.
|
Subject
|
:
|
Computer security -- Congresses.
|
LC Classification
|
:
|
QA76.9.A25E358 1997
|
Added Entry
|
:
|
Jan Carlsen
|
|
:
|
Louise Yngström
|
Parallel Title
|
:
|
SEC '97
|