|
" Advances in information security management & small systems security "
edited by Jan H.P. Eloff [and others].
Document Type
|
:
|
BL
|
Record Number
|
:
|
724396
|
Doc. No
|
:
|
b544115
|
Main Entry
|
:
|
edited by Jan H.P. Eloff [and others].
|
Title & Author
|
:
|
Advances in information security management small systems security\ edited by Jan H.P. Eloff [and others].
|
Publication Statement
|
:
|
Boston: Kluwer Academic Publishers, 2001
|
Series Statement
|
:
|
IFIP International Federation for Information Processing.
|
ISBN
|
:
|
0306470071
|
|
:
|
: 9780306470073
|
Contents
|
:
|
Preface. Acknowledgements. Reviewers. Reviewed papers. 1. Web Assurance: Information Security Management for e-commerce; L. Labuschagne. 2. A Model and Implementation Guidelines for Information Security Strategies in Web Environments; C. Margaritis, N. Kolokotronis, P. Papadopoulou, P. Kanellis, D. Martakos. 3. A Three-dimensional Framework for Security Implementation in Mobile Environments; B.R. Vinaja. 4. Maintaining Integrity within Mobile Self Protecting Objects; W. Brandi, M. Olivier. 5. Building on Solid Foundations: An Information Security Case Study; E. Roos Lindgreen, J.A. Cohen, H. de Boer, G. Uit de Bosch, C. van Rinsum. 6. Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II; E. Saul, A. Hutchison. 7. Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks; S.M. Furnell, M. Papadaki, G. Magklaras, A. Alayed. 8. A New Paradigm For Adding Security Into IS Development Methods; M. Siponen, R. Baskerville. 9. Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module; J. Biggam, A. Hogarth. 11. Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques; E. Smith, J.H.P. Eloff. 12. A Security Method for Healthcare Organisations; M. Warren, W. Hutchinson. 13. Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study; G. Dhillon, L. Silva. 14. Intrusion Detection Systems: Possibilities for the Future; K.A. Forcht, C. Allen, B. Brodman, D. Corning, J. Kouns. 15. Implementing Information Security Management Systems; F. Bjoerck. Index of contributors.
|
Abstract
|
:
|
The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented by WG11.1 and WG11.2 of the International Federation for Information Processing (IFIP), focuses on various state-of-art concepts in the two relevant fields.
|
Subject
|
:
|
Computer security -- Management -- Congresses.
|
Subject
|
:
|
Computer security -- Management.
|
Added Entry
|
:
|
Jan H P Eloff
|
Parallel Title
|
:
|
Advances in Information Security Management & Small Systems Security (Online)
|
| |