Ebook: Advances in Information Security Management & Small Systems Security
Author: Les Labuschagne (auth.) Jan H. P. Eloff Les Labuschagne Rossouw von Solms Gurpreet Dhillon (eds.)
- Tags: Management of Computing and Information Systems, Theory of Computation, Data Structures Cryptology and Information Theory
- Series: IFIP International Federation for Information Processing 72
- Year: 2001
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented by WG11.1 and WG11.2 of the International Federation for Information Processing (IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses on technical, functional as well as managerial issues. This working conference brings together researchers and practitioners of different disciplines, organisations, and countries, to discuss the latest developments in (amongst others) information security methods, methodologies and techniques, information security management issues, risk analysis, managing information security within electronic commerce, computer crime and intrusion detection. We are fortunate to have attracted two highly acclaimed international speakers to present invited lectures, which will set the platform for the reviewed papers. Invited speakers will talk on a broad spectrum of issues, all related to information security management and small system security issues. These talks cover new perspectives on electronic commerce, security strategies, documentation and many more. All papers presented at this conference were reviewed by a minimum of two international reviewers. We wish to express our gratitude to all authors of papers and the international referee board. We would also like to express our appreciation to the organising committee, chaired by Gurpreet Dhillon, for all their inputs and arrangements. Finally, we would like to thank Les Labuschagne and Hein Venter for their contributions in compiling this proceeding for WG11.1 and WG 11.2.
This book presents a state-of-the-art review of current perspectives in information security, focusing on technical as well as functional issues.
Topics in this volume include the latest developments in:
This volume contains the selected proceedings of the Eighth Annual Working Conference on Information Security Management & Small Systems Security, which was sponsored by the International Federation for Information Processing (IFIP) and held in Las Vegas, USA in September 2001.
Advances in Information Security Management & Small Systems Security will be essential reading for researchers in information systems, computer science, information technology, and business informatics, as well as to information security consultants, system analysts and engineers, and IT managers.
This book presents a state-of-the-art review of current perspectives in information security, focusing on technical as well as functional issues.
Topics in this volume include the latest developments in:
This volume contains the selected proceedings of the Eighth Annual Working Conference on Information Security Management & Small Systems Security, which was sponsored by the International Federation for Information Processing (IFIP) and held in Las Vegas, USA in September 2001.
Advances in Information Security Management & Small Systems Security will be essential reading for researchers in information systems, computer science, information technology, and business informatics, as well as to information security consultants, system analysts and engineers, and IT managers.
Content:
Front Matter....Pages i-xi
Web Assurance....Pages 1-11
A Model and Implementation Guidelines for Information Security Strategies in Web Environments....Pages 13-33
A Three-dimensional Framework for Security Implementation in Mobile Environments....Pages 35-43
Maintaining Integrity Within Mobile Self Protecting Objects....Pages 45-56
Building on Solid Foundations....Pages 57-72
Using GYPSIE, GYNGER and Visual GNY to Analyze Cryptographic Protocols in Spear II....Pages 73-85
Security Vulnerabilities and System Intrusions....Pages 87-97
A New Paradigm for Adding Security into is Development Methods....Pages 99-111
Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module....Pages 113-125
Security Documentation....Pages 127-139
Transaction Based Risk analysis - Using Cognitive Fuzzy Techniques....Pages 141-156
A Security Method for Healthcare Organisations....Pages 157-166
Interpreting Computer-related Crime at the Malaria Research Center....Pages 167-182
Intrusion Detection Systems: Possibilities for the Future....Pages 183-196
Implementing Information Security Management Systems....Pages 197-211
Back Matter....Pages 212-213
This book presents a state-of-the-art review of current perspectives in information security, focusing on technical as well as functional issues.
Topics in this volume include the latest developments in:
This volume contains the selected proceedings of the Eighth Annual Working Conference on Information Security Management & Small Systems Security, which was sponsored by the International Federation for Information Processing (IFIP) and held in Las Vegas, USA in September 2001.
Advances in Information Security Management & Small Systems Security will be essential reading for researchers in information systems, computer science, information technology, and business informatics, as well as to information security consultants, system analysts and engineers, and IT managers.
Content:
Front Matter....Pages i-xi
Web Assurance....Pages 1-11
A Model and Implementation Guidelines for Information Security Strategies in Web Environments....Pages 13-33
A Three-dimensional Framework for Security Implementation in Mobile Environments....Pages 35-43
Maintaining Integrity Within Mobile Self Protecting Objects....Pages 45-56
Building on Solid Foundations....Pages 57-72
Using GYPSIE, GYNGER and Visual GNY to Analyze Cryptographic Protocols in Spear II....Pages 73-85
Security Vulnerabilities and System Intrusions....Pages 87-97
A New Paradigm for Adding Security into is Development Methods....Pages 99-111
Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module....Pages 113-125
Security Documentation....Pages 127-139
Transaction Based Risk analysis - Using Cognitive Fuzzy Techniques....Pages 141-156
A Security Method for Healthcare Organisations....Pages 157-166
Interpreting Computer-related Crime at the Malaria Research Center....Pages 167-182
Intrusion Detection Systems: Possibilities for the Future....Pages 183-196
Implementing Information Security Management Systems....Pages 197-211
Back Matter....Pages 212-213
....