Information security -the next decade: proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95
Chapman & Hall on behalf of the IFIP, 1995 - Business & Economics - 623 pages
These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented covering a wide range of subjects including current industry expectations and current research aspects. The evolutionary development of information security as a professional and research discipline was discussed along with security in open distributed systems and security in groupware.
What people are saying - Write a review
We haven't found any reviews in the usual places.
it should not cost
Improving the security of medical database systems
Common criteria for IT security evaluation update report
37 other sections not shown
Other editions - View all
aACP access control access control list access rights action activities administration algorithm analysis application system approach attack audit authorization bits certificate class(U CMS Client communication composable properties Computer Security confidentiality context authentication cost criteria cryptographic data object database defined described differential cryptanalysis digital signature domain double-key EDIFACT encryption ensure entity environment evaluation example Figure flaws functions identified IEEE implementation information flow information security information system information technology infosec input integrity interface issues IT-system ITSEC Kerberos key escrow Key Service license server linear cryptanalysis Lotus Notes mechanisms methodology modules multilevel security non-repudiation operating system organisation parameters password possible problem procedures profiles programs protocol public key risk role S-box security policy security properties security requirements security services signature scheme smart card specific standard TCSEC TeleSeC threat transactions trusted typing user's verify voting