Information security - the next decade : proceedings of the IFIP TC11 eleventh international conference on information security, IFIP/Sec '95
Author(s)
Bibliographic Information
Information security - the next decade : proceedings of the IFIP TC11 eleventh international conference on information security, IFIP/Sec '95
Chapman & Hall on behalf of the IFIP, 1995
Available at 5 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references
Description and Table of Contents
Description
These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented covering a wide range of subjects including current industry expectations and current research aspects. The evolutionary development of information security as a professional and research discipline was discussed along with security in open distributed systems and security in groupware.
Table of Contents
Invited talk 1: Security should pay: it should not cost. Information security and business applications 1. Information security standards. Invited talk 2: Encryption policy for the global information infrastructure. Management of information security 1. Cryptography, key management schemes and mobile computing. Invited talk 3: A new framework for information security to avoid information anarchy. Information security and groupware. Building secure applications. Invited talk 4: Functional and operational security system for open distributed environments. Open distributed security 1. Management of information security 2. Open distributed security 2. Invited talk 5: Viruses, corruption, denial, disruption and information assurance. Access control. Legal, ethical and social issues of information security. Appendixes. Index of contributors.
by "Nielsen BookData"