Computer Security and Information Integrity: Proceedings of the Sixth IFIP International Conference on Computer Security and Information Integrity in Our Changing World, IFIP/Sec'90, Espoo (Helsinki), Finland, 23-25 May, 1990
Klaus R. Dittrich, Seppo Rautakivi, Juhani Saari
North-Holland, 1991 - Computers - 421 pages
L. Arnkil and E. Einola - POS Security - State of Art in Finland; K. Bauknecht and C. Straus - Portfolio techniques to support risk management and security; J.G. Beatson - Security - A personnel issue the importance os personnel attitudes and security education; I. Bentzien - EDP safety and usage; D. Bonyun and G. Jones - A knowloedge based method of managing risks in dynamic environments; K. Brunnstein and S. Fischer-Hübner - Risk analysis of "trusted computer systems"; R.K. Burns - A relational dbms security policy; H. Cnudde - Cryptel: the practical protection of an existing electronic mail system; C. Cresson Wood - Planning as a means to achieve appropriate data communications security; R. Dierstein - The concept of secure information processing systems and their basic functions; J. Dobson - A Methodology for analysing human and computer-related issues in secure systems; W. Fumy and a. Pfau - Asymmetric authentication schemes for smart cards - dream or reality?; R. Hackworth - Contingency planning - managing the external impacts of system security failures; H.J. Highland - Computer viruses: factors to consider before purchasing an anti-virus product; D.B. Holden - The digital distributed system security architecture; S. Kowalski - Computer ethics and computer abuse: a longitudinal study of swedish university students; M.P.J. Kratz and P.J. Johnston - Managing the virus risk; K.E. Kristiansen - Information systems auditing - a suport to management; K.H. Krueger - Planning for disaster recovery in a multi-vendor, networked computing environment; Y. Le Roux - Technical criteria for security evaluation of information technology products; J. Lobel - Proactive network risk management; W. Madsen - Data privacy - legislation and intelligence agency threats; R.R. Moeller - Separation of duties audit concerns and the clark-wilson data integrity model; S. Muftic - Security in open distributed processing (odp) systems; R. Paans and H. de Lange - Auditing the sna/sni environment; D.B. Parker - Seventeen information security myths debunked; H.P. Rieb - Modeling security in distribuited systems; B. Sarton and P. Capiteijns - Corporate informarion security policy... a paper tiger?; P.M. Stanley - Computer assisted investigation of computer crime; M. Tantam - Trouble ahead: information crime and jurisdiction; L.T. Taylor - Case tools and security: a solution or a problem?
What people are saying - Write a review
We haven't found any reviews in the usual places.
access class access control action activities agent application aspects assertions audit auditor authentication automated basic certainty measure Clark-Wilson Clark-Wilson model components computer security computer systems computer virus concept confidentiality criteria data bases data processing database defined discretionary access controls disk distributed domain electronic employees encryption enforcement entities environment ethical evaluation example execute external files foreign key formal function hardware IEEE IFIP implementation individual Information Integrity information security information systems intelligence interface internal investigation IP-system mandatory access control network security operating system Orange Book organization package password person personal computers Privacy problem procedures protection protocols Publishers B.V. North-Holland Rautakivi recovery reference monitor relation requirements Saari Editors Security and Information security mechanisms security policy security services separation of duties Sigint Smart Card specific standards structure superuser system security threats trusted tuple unauthorized verify viruses WTAM