Security in the Information Society

Lieferzeit: Lieferbar innerhalb 14 Tagen

160,49 

Visions and Perspectives, IFIP Advances in Information and Communication Technology 86

ISBN: 1475710267
ISBN 13: 9781475710267
Herausgeber: M Adeeb Ghonaimy/Mahmoud T El-Hadidi/Heba K Aslan
Verlag: Springer Verlag GmbH
Umfang: xii, 586 S.
Erscheinungsdatum: 12.12.2012
Auflage: 1/2012
Produktform: Kartoniert
Einband: KT
Artikelnummer: 5498106 Kategorie:

Beschreibung

Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt.

Inhaltsverzeichnis

InhaltsangabePreface. IFIP/SEC2002 Conference Committees. Part One: Information Security Management. 1. The Effective Implementation of Information Security in Organizations; O.A. Hoppe, J. Van Niekerk, R. Von Solms. 2. A Practical Approach to Information Security Awareness in the Organization; C. Vroom, R. Von Solms. 3. RBAC Policies in XML for X.509 Based Privilege Management; D.W. Chadwick, A. Otenko. 4. A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration; A. Ahmad, T. Ruighaver. 5. Elaborating Quantitative Approaches for IT Security Evaluation; D. Gritzalis, M. Karyda, L. Gymnopoulos. Part Two: Standards of Information Security. 6. A Security Evaluation Criteria for Baseline Security Standards; W.J. Brooks, M. Warren, W. Hutchinson. 7. Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects; M.T. Siponen. 8. For a Secure Mobile IP and Mobile IPv6 Deployment; M. Laurent-Maknavicius. Part Three: Threats and Attacks to Information. 9. Addressing Internet Security Vulnerabilities: A Benchmarking Study; A. Alayed, S.M. Furnell, I.M. Barlow. 10. The Threat From Within -An Analysis of Attacks on anInternal Network; J. Haggerty, Q. Shi, M. Merabti. 11. Security Vulnerabilities in Event-Driven Systems; S. Xenitellis. 12. Denial of Service: Another Example; J.J. Yan. 13. A Detection Scheme for the SK Virus; D. Salah, H.K. Aslan, M.T. El-Hadidi. Part Four: Education and Curriculum for Information Security. 14. An Information Security Curriculum in Finland; T. Virtanen, R. Addams-Moring. Part Five: Social and Ethical Aspects of Information Security. 15. Information Security Culture: The Socio-Cultural Dimension in Information Security Management; T. Schlienger, S. Teufel. 16. Information Security Culture; A. Martins, J. Eloff. Part Six: Information Security Services. 17. Keystroke Analysis as a Method of Advanced User Authentication and Response; P.S. Dowland, S.M. Furnell, M. Papadaki. 18. Zero Knowledge Broadcasting Identification Scheme; M.S. El-Soudani, H.S. El-Refaey, H.M. Mourad. 19. A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services; Li-Sha He, N. Zhang, Li-Rong He. 20. Mandatory Security Policies for CORBA Security Model; C.M. Westphall, J. Da S. Fraga, C.B. Westphall, S.C.S. Bianchi. 21. Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security; C.M. Westphall, J. Da S. Fraga, M.S. Wangham, R.R. Obelheiro, L.C. Lung. 22. Secure Database Connectivity on the WWW; M. Coetzee, J. Eloff. 23. Towards Semantic Integrity in Rational Databases; R.A. Botha. 24. Formal Design of Packet Filtering Systems; G. Osman, M.G. Darwish, M. Zaki. 25. Elliptic Curve Cryptosystems on Smart Cards; E. Mohammed, A. Emarah, Kh. El-Shennawy. Part Seven: Multilateral Security. 26. Establishing Bilateral Anonymous Communication in Open Networks; T. Demuth. Part Eight: Applications of Information Security. 27. BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business;

Das könnte Ihnen auch gefallen …