IT security : the need for international cooperation : proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992
著者
書誌事項
IT security : the need for international cooperation : proceedings of the IFIP TC11 Eighth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992
(IFIP transactions, A . Computer science and technology ; 15)
North-Holland, 1992
大学図書館所蔵 全4件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes bibliographical references and indexes
内容説明・目次
内容説明
The original title of IFIP/Sec'92, "From Small Systems to Large," was chosen, not to de-emphasize the continuing importance of security in large computer systems, but to direct attention to the increasing importance of smaller computer systems and their related security and control concerns. Trends contributing to the increased importance of small systems include: downsizing - the replacement of large central systems with smaller distributed systems, increasingly powerful microcomputers, the increasing sophistication and acceptance of LANs, end-user computing, and the devolution of IS management to functional management. The final title, "The Need for International Cooperation", derives from what became the central topic of discussion. The mix of papers in this book is both managerial and technical. Sections with relatively greater managerial content are: Security Management, IS Audit, and Computer Crime. The more technical sections are Database Security, Access Control and Detection, UNIX Security, Network Security, and Cryptography. Most papers have managerial, organisational and technical dimensions.
目次
Keynote and Invited Papers. International Information Technology (IT) Security Cooperation into the 21st Century (W. Madsen). Computer Disasters: The Impact on Business in the 1990's (A. Reed). ASEAN - Computer Crime and Corrective Action: A Status Report (T.S. Chew). Security Management I. Information Security: The Impact of End User Computing (J. Beatson). PRAJORIS - A Pragmatic 'Joint' Method for Raising the Information Security Level in a Company (S. Bentzen). The Status of IT Security in Leading European Organisations (A. Stanley). Findings of the Swedish CITI Project on Information Security Evaluation and Certification (P. Hoving, M. Ohlin, J. Rylander). Network Security. Secure Open Systems: An Investigation of Current Standardization Efforts for Security in Open Systems (P. Overbeek). Network Security: Design of a Global Secure Link (W. Wang, T. Coffey). MAPS - Model for Automated Profile Specification (D. Pottas, S.H. von Solms). Cryptography and the Art of Securing Transactions (C. Holloway). Restating the Foundation of Information Security (D.B. Parker). Security Management II. Data Security Model for Branch Offices of Big Organisations (L.J. Janczewski). Practical Security for the Small Computer User (D. Bachelor, P. Kingston). Information Security Awareness - Selling the Cause (K. McLean). A Company's Battle Against the Virus Plague (P. Capiteijns). IS Audit. How Expert are Auditors in the Computer Security Field? South African Findings and Interpretations (D. Fink). IS Audit Research: A Paradigm and a Framework (C. Soh, G.G. Gable). Cryptography. Measuring the Strength of Ciphers (H. Gustafson et al.). Cryptographic Protocols and Network Security (P. Horster, H.-J. Knobloch). A Solution to Generalized Group Oriented Cryptography (C.-C. Chang, H.-C. Lee). A Methodology For Describing Information and Physical Security Architectures (W.J. Caelli, D. Longley, A. Tickle). Computer Crime I. A Methodology for the Investigation of Computer Crime (P.M. Stanley). Deterring Highly Motivated Computer Abusers: A Field Experiment in Computer Security (D. Straub, P.J. Carlson, E.H. Jones). IT Crime - An Intelligence Report (B. Fortrie). UNIX Operating System Security (J. Clark). Database Security. DISCO - A Discretionary Security Model for Object-Oriented Databases (M.S. Olivier, S.H. von Solms). Referential Integrity in Multilevel Secure Database Management Systems (V.M. Doshi, S. Jajodia). A Complex Approach to the Security of Statistical Databases Subject to Off-Line Sum Queries (Y.-M. Chee, A. Lim). UNIX Security. The New Security Paradigm in the Enterprise Computing Environment (C. Rubin). Integrating B2 Security into a UNIX System (K.H. Brady). Access Control/Detection. Rule-Based Trusted Access Control (M.D. Abrams, I.M. Olson). Governmentware: A New Vehicle to Boost Computer Security on a National Level (C.-S. Yu). A Rule-Based Intrusion Detection System (D. Holden). Access Control - A Further Approach (B. Lau). Computer Crime II.
「Nielsen BookData」 より