Computer Security and Information Integrity: Proceedings of the Sixth IFIP International Conference on Computer Security and Information Integrity in Our Changing World, IFIP/Sec'90, Espoo (Helsinki), Finland, 23-25 May, 1990

Front Cover
Klaus R. Dittrich, Seppo Rautakivi, Juhani Saari
North-Holland, 1991 - Computers - 421 pages
L. Arnkil and E. Einola - POS Security - State of Art in Finland; K. Bauknecht and C. Straus - Portfolio techniques to support risk management and security; J.G. Beatson - Security - A personnel issue the importance os personnel attitudes and security education; I. Bentzien - EDP safety and usage; D. Bonyun and G. Jones - A knowloedge based method of managing risks in dynamic environments; K. Brunnstein and S. Fischer-Hübner - Risk analysis of "trusted computer systems"; R.K. Burns - A relational dbms security policy; H. Cnudde - Cryptel: the practical protection of an existing electronic mail system; C. Cresson Wood - Planning as a means to achieve appropriate data communications security; R. Dierstein - The concept of secure information processing systems and their basic functions; J. Dobson - A Methodology for analysing human and computer-related issues in secure systems; W. Fumy and a. Pfau - Asymmetric authentication schemes for smart cards - dream or reality?; R. Hackworth - Contingency planning - managing the external impacts of system security failures; H.J. Highland - Computer viruses: factors to consider before purchasing an anti-virus product; D.B. Holden - The digital distributed system security architecture; S. Kowalski - Computer ethics and computer abuse: a longitudinal study of swedish university students; M.P.J. Kratz and P.J. Johnston - Managing the virus risk; K.E. Kristiansen - Information systems auditing - a suport to management; K.H. Krueger - Planning for disaster recovery in a multi-vendor, networked computing environment; Y. Le Roux - Technical criteria for security evaluation of information technology products; J. Lobel - Proactive network risk management; W. Madsen - Data privacy - legislation and intelligence agency threats; R.R. Moeller - Separation of duties audit concerns and the clark-wilson data integrity model; S. Muftic - Security in open distributed processing (odp) systems; R. Paans and H. de Lange - Auditing the sna/sni environment; D.B. Parker - Seventeen information security myths debunked; H.P. Rieb - Modeling security in distribuited systems; B. Sarton and P. Capiteijns - Corporate informarion security policy... a paper tiger?; P.M. Stanley - Computer assisted investigation of computer crime; M. Tantam - Trouble ahead: information crime and jurisdiction; L.T. Taylor - Case tools and security: a solution or a problem?

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Preface
1
K Bauknecht and C Strauss
9
J G Beatson
29
Copyright

25 other sections not shown

Common terms and phrases

About the author (1991)

Dittrich, University of Zurich, Germany.

Bibliographic information