Computer security in the age of information : proceedings of the Fifth IFIP International Conference on Computer Security, IFIP/Sec '88, Gold Coast, Queensland, Australia, 19-21 May, 1988
Author(s)
Bibliographic Information
Computer security in the age of information : proceedings of the Fifth IFIP International Conference on Computer Security, IFIP/Sec '88, Gold Coast, Queensland, Australia, 19-21 May, 1988
North-Holland , Distributors for the U.S. and Canada, Elsevier Science Pub. Co., 1989
Available at 4 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references
Description and Table of Contents
Description
The 41 papers collected in this volume reflect the growing importance of security in computer and telecommunications systems. The creation and study of security systems has firmly entered the mainstream of Computer Science and Computer Systems Engineering in academic, educational and industrial research organisations. Research into computer architecture, operating systems, data base management systems, data communications protocols, standards, human interfaces and numerous other areas has been affected by the growing requirements for sufficiently developed security measures. Governmental responses to the problems of personal privacy, computer related criminal activity etc., have likewise been growing over the last two to three years and appear set to increase markedly in the near future.
Table of Contents
Cryptographic Systems - I. Secure Data Bases. EFTS and Banking. Cryptographic Systems - II. Organisations and Education. Computer Crime. Cryptographic Systems - III. Office Automation. Security Products and Systems. Crypto-Key Systems. Secure / Trusted Systems - I. Access / Authentication Control - I. Auditing - I. Secure / Trusted Systems - II. Access / Authentication Control - II. Secure / Trusted Systems - III. Document Interchange and Networks. Networks / EFT. EFTS and Cost of Security. Auditing - II. Networks, PCs and Workstations. Authentication and Identification. Index.
by "Nielsen BookData"