Security Management, Integrity, and Internal Control in Information Systems IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Dowland, Paul (Επιμελητής έκδοσης), Furnell, Steve (Επιμελητής έκδοσης), Thuraisingham, Bhavani (Επιμελητής έκδοσης), Wang, X. Sean (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2006.
Σειρά:IFIP International Federation for Information Processing, 193
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Security Standards
  • Information Security Standards: Adoption Drivers (Invited Paper)
  • Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper)
  • From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper)
  • Security Culture
  • How Much Should We Pay for Security? (Invited Paper)
  • Do Not Ship, or Receive, Trojan Horses
  • Employee Security Perception in Cultivating Information Security Culture
  • Access Management
  • A Policy Framework for Access Management in Federated Information Sharing
  • A Hierarchical Release Control Policy Framework
  • Risk Management
  • Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC
  • The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study
  • Risk Communication, Risk Perception and Information Security
  • A Holistic Risk Analysis Method for Identifying Information Security Risks
  • Security Culture
  • A Responsibility Framework for Information Security
  • Information Security Governance - A Re-Definition
  • Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper)
  • Security Management
  • Measurement of Information Security in Processes and Products
  • A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises
  • A UML Approach in the ISMS Implementation
  • Applications
  • Attack Aware Integrity Control in Databases (Invited Abstract)
  • Characteristics and Measures for Mobile-Masquerader Detection
  • A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions
  • Access Management
  • A Trust-Based Model for Information Integrity in Open Systems
  • Scalable Access Policy Administration (Invited Paper)
  • Semantic Information Infrastructure Protection (Invited Abstract).