Security Management, Integrity, and Internal Control in Information Systems IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference /
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | IFIP Advances in Information and Communication Technology,
193 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Security Standards
- Information Security Standards: Adoption Drivers (Invited Paper)
- Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper)
- From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper)
- Security Culture
- How Much Should We Pay for Security? (Invited Paper)
- Do Not Ship, or Receive, Trojan Horses
- Employee Security Perception in Cultivating Information Security Culture
- Access Management
- A Policy Framework for Access Management in Federated Information Sharing
- A Hierarchical Release Control Policy Framework
- Risk Management
- Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC
- The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study
- Risk Communication, Risk Perception and Information Security
- A Holistic Risk Analysis Method for Identifying Information Security Risks
- Security Culture
- A Responsibility Framework for Information Security
- Information Security Governance - A Re-Definition
- Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper)
- Security Management
- Measurement of Information Security in Processes and Products
- A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises
- A UML Approach in the ISMS Implementation
- Applications
- Attack Aware Integrity Control in Databases (Invited Abstract)
- Characteristics and Measures for Mobile-Masquerader Detection
- A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions
- Access Management
- A Trust-Based Model for Information Integrity in Open Systems
- Scalable Access Policy Administration (Invited Paper)
- Semantic Information Infrastructure Protection (Invited Abstract).