|
![]() |
|||
|
||||
OverviewThis text presents a review of current perspectives in information security management and small systems security, focusing on technical and functional as well as managerial issues. It contains the selected proceedings of the Seventh Annual Working Conference on Information Security Management and Small Systems Security, sponsored by the International Federation for Information Processing (IFIP) and held in Amsterdam, Netherlands, in September/October 1999. Topics in this volume include the latest developments in: secure techniques for smart card technology; information security management issues; risk analysis; intranets; electronic commerce protocols; certification and accreditation; and biometrics authentication. This volume will be useful reading for researchers in computer science, information technology, and business informatics, as well as for information security consultants, systems analysts and engineers and IT managers. Full Product DetailsAuthor: Jan H.P. Eloff , Les Labuschagne , Rossouw von Solms , Jan VerschurenPublisher: Springer Imprint: Springer Edition: 1999 ed. Volume: 26 Dimensions: Width: 15.50cm , Height: 1.50cm , Length: 23.50cm Weight: 1.200kg ISBN: 9780792386261ISBN 10: 0792386264 Pages: 248 Publication Date: 30 September 1999 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contentsone — Reviewed papers.- 1. A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards.- 2. Real-time Risk Analysis on the Internet: a prototype.- 3. A practical approach to manage data communication security.- 4. The Future of Australian & New Zealand Security Standard AS/NZS 4444?.- 5. The Effective Utilization of Audit Logs in Information Security Management.- 6. An approach to standardizing security analysis methods for virtual systems.- 7. Information Security at Top Level — Securometer® streamlines management information.- 8. Risk analysis on Internet connection.- 9. A Secure Station for Network Monitoring and Control.- 10. Security aspects of a Java-servlet-based web-hosted e-mail system.- 11. Time as an Aid to Improving Security in Smart Cards.- 12. The Intranet Authorization Paradigm.- 13. Predicting the Performance of Transactional Electronic Commerce Protocols.- two — Invited papers.- 14. The Cyber-Posture of the National Information Infrastructure.- 15. Principles of Iris Recognition.- 16. Designing a Secure System for Implementing Chip Cards in the Financial Services Industry.- 17. New models for the management of public key infrastructure and root certification authorities.- 18. A Secure Electronic Commerce Environment: Only with “Smart Cards”.- Index of contributors.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |