Computer security and information integrity : proceedings of the Sixth IFIP International Conference on Computer Security and Information Integrity in Our Changing World, IFIP/Sec'90, Espoo (Helsinki), Finland, 23-25 May, 1990

書誌事項

Computer security and information integrity : proceedings of the Sixth IFIP International Conference on Computer Security and Information Integrity in Our Changing World, IFIP/Sec'90, Espoo (Helsinki), Finland, 23-25 May, 1990

edited by Klaus Dittrich, Seppo Rautakivi, Juhani Saari

North-Holland , Distributors for the U.S. and Canada, Elsevier Science, 1991

大学図書館所蔵 件 / 7

この図書・雑誌をさがす

注記

Includes bibliographical references

内容説明・目次

内容説明

Computer security and information integrity are areas of vital importance whose real significance is only just being recognised. This book presents research into a range of topics, including management issues, viruses and corporate policy. All major aspects of the field are covered, with a strong emphasis on practical solutions.

目次

POS Security - State of Art in Finland (L. Arnkil, E. Einola). Portfolio Techniques to Support Risk Management and Security (K. Bauknecht, C. Strauss). Security - A Personnel Issue: The Importance of Personnel Attitudes and Security Education (J.G. Beatson). EDP Safety and Usage (I. Bentzien). A Knowedge Based Method of Managing Risks in Dynamic Environments (D. Bonyun, G. Jones). Risk Analysis of "Trusted Computer Systems" (K. Brunnstein, S. Fischer-Hubner). A Relational DBMS Security Policy (R.K. Burns). CRYPTEL: The Practical Protection of an Existing Electronic Mail System (H. Cnudde). Planning as a Means to Achieve Appropriate Data Communications Security (C. Cresson Wood). The Concept of Secure Information Processing Systems and Their Basic Functions (R. Dierstein). A Methodology for Analysing Human and Computer-Related Issues in Secure Systems (J. Dobson). Asymmetric Authentication Schemes for Smart Cards - Dream or Reality? (W. Fumy, A. Pfau). Contingency Planning - Managing the External Impacts of System Security Failures (R. Hackworth). Computer Viruses: Factors to Consider Before Purchasing an Anti-Virus Product (H.J. Highland). The Digital Distributed System Security Architecture (D.B. Holden). Computer Ethics and Computer Abuse: A Longitudinal Study of Swedish University Students (S. Kowalski). Managing the Virus Risk (M.P.J. Kratz, P.J. Johnston). Information Systems Auditing - A Support to Management (K.E. Kristiansen). Planning for Disaster Recovery in a Multi-Vendor, Networked Computing Environment (K.H. Krueger). Technical Criteria for Security Evaluation of IT Products (Y. Le Roux). Proactive Network Risk Management (J. Lobel). Data Privacy: Legislation and Intelligence Agency Threats (W. Madsen). Separation of Duties Audit Concerns and the Clark-Wilson Data Integrity Model (R.R. Moeller). Security in ODP Systems (S. Muftic). Auditing the SNA/SNI Environment (R. Paans, H. de Lange). Seventeen Information Security Myths Debunked (D.B. Parker). Modelling Security in Distributed Systems (H.P. Riess). Corporate Information Security Policy (B. Sarton, P. Capiteijns). Computer Assisted Investigation of Computer Crime (P.M. Stanley). Trouble Ahead: Information Crime and Jurisdiction (M. Tantam). Case Tools and Security: A Solution or a Problem? (L.T. Taylor).

「Nielsen BookData」 より

詳細情報

ページトップへ