Information Security in Research and Business
Chapman and Hall (Verlag)
978-0-412-81780-9 (ISBN)
1 Information security — challenges for the next millenium.- 2 Selection of secure single sign-on solutions for heterogeneous computing environments.- 3 A formal model to aid documenting and harmonizing of information security requirements.- 4 A compile-time model for safe information flow in object-oriented databases.- 5 Deriving Authorizations from Process Analysis in Legacy Information Systems.- 6 The Role of Government in Creating the IT Security Infrastructure: Builder or Bystander?.- 7 Code of Practice: A Standard for Information Security Management.- 8 Can security baselines replace risk analysis?.- 9 gGSS-API: a group enhanced generic security service.- 10 Electronic document exchange in Sweden — the legal aspects.- 11 An attack detection system for secure computer systems — outline of the solution.- 12 A taxonomy and overview of information security experiments.- 13 Pseudonymous audit for privacy enhanced intrusion detection.- 14 Individual management of personal reachability in mobile communication.- 15 New vistas on info-system security.- 16 A common criteria framework for the evaluation of information technology systems security.- 17 A methodology for accrediting a commercial distributed database.- 18 A comparison of schemes for certification authorities/trusted third parties.- 19 How to trust systems.- 20 Integrating information security in the development of telematics systems.- 21 Developing secure applications: a systematic approach.- 22 Controlling Internet access at an educational institution.- 23 Analysis of Java security and hostile applets.- 24 New organizational forms for information security management.- 25 Security when outsourcing: concepts, constructs, compliance.- 26 The IFIP TC11 position on cryptopolicies.- 27 Towards an holistic viewof enterprise ICT security and safety.- 28 A taxonomy of electronic cash schemes.- 29 Large scale elections by coordinating electoral colleges.- 30 MVS-SAT: a security administration tool to support SMF protocol data evaluation.- 31 security requirements and solutions in distributed electronic health records.- 32 ODESSA — a new approach to healthcare risk analysis.- 33 A comprehensive need-to-know access control system and its application for medical information systems.- 34 The future of networks and network security.- 35 Securing communications over ATM networks.- 36 Non-intrusive authentication.- 37 Roaming security agents enabling intelligent access control and network protection.- Index of contributors.- Keyword index.
Erscheint lt. Verlag | 31.5.1997 |
---|---|
Reihe/Serie | IFIP International Federation for Information Processing |
Zusatzinfo | XII, 472 p. |
Verlagsort | London |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Datenbanken ► Data Warehouse / Data Mining |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-412-81780-2 / 0412817802 |
ISBN-13 | 978-0-412-81780-9 / 9780412817809 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich