Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management ... 1, 1999, Amsterdam, The Netherlands: 26 - Rilegato

 
9780792386261: Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management ... 1, 1999, Amsterdam, The Netherlands: 26

Sinossi

This text presents a review of current perspectives in information security management and small systems security, focusing on technical and functional as well as managerial issues. It contains the selected proceedings of the Seventh Annual Working Conference on Information Security Management and Small Systems Security, sponsored by the International Federation for Information Processing (IFIP) and held in Amsterdam, Netherlands, in September/October 1999. Topics in this volume include the latest developments in: secure techniques for smart card technology; information security management issues; risk analysis; intranets; electronic commerce protocols; certification and accreditation; and biometrics authentication. This volume will be useful reading for researchers in computer science, information technology, and business informatics, as well as for information security consultants, systems analysts and engineers and IT managers.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Contenuti

Preface. Acknowledgements. Part one: Reviewed Papers. 1. A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards; R. Weis. 2. Real-time Risk Analysis on the Internet: a prototype; H.S. Venter, et al. 3. A practical approach to manage data communication security; P.H. Samwel, M. Spruit. 4. The Future of Australian & New Zealand Security Standard AS/NZS 4444?; M. Warren, B. Hutchinson. 5. The Effective Utilization of Audit Logs in Information Security Management; W. Olivier, R. von Solms. 6. An approach to standardizing security analysis methods for virtual systems; A. Frisinger, L. Yngstrom. 7. Information Security at Top Level - Securometer® streamlines management information; A. Buren, et al. 8. Risk analysis on Internet connection; M. Spruit, P.H. Samwel. 9. A Secure Station for Network Monitoring and Control; V. Prevelakis. 10. Security aspects of a Java-servlet-based web-hosted e-mail system; E. Hepworth, U. Ultes-Nitsche. 11. Time as an Aid to Improving Security in Smart Cards; V. Cordonnier, et al. 12. The Intranet Authorization Paradigm; M. Vandenwauver, et al. 13. Predicting the Performance of Transactional Electronic Commerce Protocols; M. Berry, et al. Part two: Invited papers. 14. The Cyber-Posture of the National Information Infrastructure; W.H. Ware. 15. Principles of Iris Recognition; M. Negin, M. van der Harst. 16. Designing a Secure System for Implementing Chip Cards in the Financial Services Industry; T. Stanley.17. New models for the management of public key infrastructure and root certification authorities; S. Wilson. 18. A Secure Electronic Commerce Environment: Only with `Smart Cards'; W. Caelli. Index of contributors.

Product Description

Book by None

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

Altre edizioni note dello stesso titolo

9781475754834: Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management ... 1, 1999, Amsterdam, The Netherlands: 26

Edizione in evidenza

ISBN 10:  1475754833 ISBN 13:  9781475754834
Casa editrice: Springer, 2013
Brossura