Computer security and information integrity : proceedings of the Sixth IFIP International Conference on Computer Security and Information Integrity in Our Changing World, IFIP/Sec'90, Espoo (Helsinki), Finland, 23-25 May, 1990

Bibliographic Information

Computer security and information integrity : proceedings of the Sixth IFIP International Conference on Computer Security and Information Integrity in Our Changing World, IFIP/Sec'90, Espoo (Helsinki), Finland, 23-25 May, 1990

edited by Klaus Dittrich, Seppo Rautakivi, Juhani Saari

North-Holland , Distributors for the U.S. and Canada, Elsevier Science, 1991

Available at  / 7 libraries

Search this Book/Journal

Note

Includes bibliographical references

Description and Table of Contents

Description

Computer security and information integrity are areas of vital importance whose real significance is only just being recognised. This book presents research into a range of topics, including management issues, viruses and corporate policy. All major aspects of the field are covered, with a strong emphasis on practical solutions.

Table of Contents

POS Security - State of Art in Finland (L. Arnkil, E. Einola). Portfolio Techniques to Support Risk Management and Security (K. Bauknecht, C. Strauss). Security - A Personnel Issue: The Importance of Personnel Attitudes and Security Education (J.G. Beatson). EDP Safety and Usage (I. Bentzien). A Knowedge Based Method of Managing Risks in Dynamic Environments (D. Bonyun, G. Jones). Risk Analysis of "Trusted Computer Systems" (K. Brunnstein, S. Fischer-Hubner). A Relational DBMS Security Policy (R.K. Burns). CRYPTEL: The Practical Protection of an Existing Electronic Mail System (H. Cnudde). Planning as a Means to Achieve Appropriate Data Communications Security (C. Cresson Wood). The Concept of Secure Information Processing Systems and Their Basic Functions (R. Dierstein). A Methodology for Analysing Human and Computer-Related Issues in Secure Systems (J. Dobson). Asymmetric Authentication Schemes for Smart Cards - Dream or Reality? (W. Fumy, A. Pfau). Contingency Planning - Managing the External Impacts of System Security Failures (R. Hackworth). Computer Viruses: Factors to Consider Before Purchasing an Anti-Virus Product (H.J. Highland). The Digital Distributed System Security Architecture (D.B. Holden). Computer Ethics and Computer Abuse: A Longitudinal Study of Swedish University Students (S. Kowalski). Managing the Virus Risk (M.P.J. Kratz, P.J. Johnston). Information Systems Auditing - A Support to Management (K.E. Kristiansen). Planning for Disaster Recovery in a Multi-Vendor, Networked Computing Environment (K.H. Krueger). Technical Criteria for Security Evaluation of IT Products (Y. Le Roux). Proactive Network Risk Management (J. Lobel). Data Privacy: Legislation and Intelligence Agency Threats (W. Madsen). Separation of Duties Audit Concerns and the Clark-Wilson Data Integrity Model (R.R. Moeller). Security in ODP Systems (S. Muftic). Auditing the SNA/SNI Environment (R. Paans, H. de Lange). Seventeen Information Security Myths Debunked (D.B. Parker). Modelling Security in Distributed Systems (H.P. Riess). Corporate Information Security Policy (B. Sarton, P. Capiteijns). Computer Assisted Investigation of Computer Crime (P.M. Stanley). Trouble Ahead: Information Crime and Jurisdiction (M. Tantam). Case Tools and Security: A Solution or a Problem? (L.T. Taylor).

by "Nielsen BookData"

Details

Page Top