Online Library TheLib.net » Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
cover of the book Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference

Ebook: Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference

00
27.01.2024
0
0

International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.

For more information about IFIP, please visit www.ifip.org.




International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.

 

For more information about IFIP, please visit www.ifip.org.




International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.

 

For more information about IFIP, please visit www.ifip.org.


Content:
Front Matter....Pages i-xi
Front Matter....Pages xiii-xiii
Information Security Standards: Adoption Drivers (Invited Paper)....Pages 1-20
Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper)....Pages 21-39
From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper)....Pages 41-55
Front Matter....Pages 57-57
How Much Should We Pay for Security? (Invited Paper)....Pages 59-69
Do Not Ship, or Receive, Trojan Horses....Pages 71-82
Employee Security Perception in Cultivating Information Security Culture....Pages 83-92
Front Matter....Pages 93-93
A Policy Framework for Access Management in Federated Information Sharing....Pages 95-120
A Hierarchical Release Control Policy Framework....Pages 121-137
Front Matter....Pages 139-139
Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC....Pages 141-156
The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study....Pages 157-173
Risk Communication, Risk Perception and Information Security....Pages 175-184
A Holistic Risk Analysis Method for Identifying Information Security Risks....Pages 185-202
Front Matter....Pages 203-203
A Responsibility Framework for Information Security....Pages 205-221
Information Security Governance - A Re-Definition....Pages 223-236
Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper)....Pages 237-245
Front Matter....Pages 247-247
Measurement of Information Security in Processes and Products....Pages 249-265
A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises....Pages 267-283
A UML Approach in the ISMS Implementation....Pages 285-297
Front Matter....Pages 299-299
Attack Aware Integrity Control in Databases (Invited Abstract)....Pages 301-301
Characteristics and Measures for Mobile-Masquerader Detection....Pages 303-318
Front Matter....Pages 299-299
A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions....Pages 319-333
Front Matter....Pages 335-335
A Trust-Based Model for Information Integrity in Open Systems....Pages 337-354
Scalable Access Policy Administration (Invited Paper)....Pages 355-370
Semantic Information Infrastructure Protection (Invited Abstract)....Pages 371-371
Back Matter....Pages 373-376


International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.

 

For more information about IFIP, please visit www.ifip.org.


Content:
Front Matter....Pages i-xi
Front Matter....Pages xiii-xiii
Information Security Standards: Adoption Drivers (Invited Paper)....Pages 1-20
Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper)....Pages 21-39
From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper)....Pages 41-55
Front Matter....Pages 57-57
How Much Should We Pay for Security? (Invited Paper)....Pages 59-69
Do Not Ship, or Receive, Trojan Horses....Pages 71-82
Employee Security Perception in Cultivating Information Security Culture....Pages 83-92
Front Matter....Pages 93-93
A Policy Framework for Access Management in Federated Information Sharing....Pages 95-120
A Hierarchical Release Control Policy Framework....Pages 121-137
Front Matter....Pages 139-139
Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC....Pages 141-156
The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study....Pages 157-173
Risk Communication, Risk Perception and Information Security....Pages 175-184
A Holistic Risk Analysis Method for Identifying Information Security Risks....Pages 185-202
Front Matter....Pages 203-203
A Responsibility Framework for Information Security....Pages 205-221
Information Security Governance - A Re-Definition....Pages 223-236
Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper)....Pages 237-245
Front Matter....Pages 247-247
Measurement of Information Security in Processes and Products....Pages 249-265
A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises....Pages 267-283
A UML Approach in the ISMS Implementation....Pages 285-297
Front Matter....Pages 299-299
Attack Aware Integrity Control in Databases (Invited Abstract)....Pages 301-301
Characteristics and Measures for Mobile-Masquerader Detection....Pages 303-318
Front Matter....Pages 299-299
A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions....Pages 319-333
Front Matter....Pages 335-335
A Trust-Based Model for Information Integrity in Open Systems....Pages 337-354
Scalable Access Policy Administration (Invited Paper)....Pages 355-370
Semantic Information Infrastructure Protection (Invited Abstract)....Pages 371-371
Back Matter....Pages 373-376
....
Download the book Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen