Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands

Author:   Jan H.P. Eloff ,  Les Labuschagne ,  Rossouw von Solms ,  Jan Verschuren
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 1999
Volume:   26
ISBN:  

9781475754834


Pages:   248
Publication Date:   21 March 2013
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $448.77 Quantity:  
Add to Cart

Share |

Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands


Add your own review!

Overview

The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security), jointly presented by WG 11.1 and WG 11.2 of the International Federation for Information Processing {IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses on technical, functional as well as managerial issues. This working conference brings together researchers and practitioners of different disciplines, organisations, and countries, to discuss the latest developments in (amongst others) secure techniques for smart card technology, information security management issues, risk analysis, intranets, electronic commerce protocols, certification and accreditation and biometrics authentication. W e are fortunate to have attracted at least six highly acclaimed international speakers to present invited lectures, which will set the platform for the reviewed papers. Invited speakers will talk on a broad spectrum of issues, all related to information security management and small system security issues. These talks cover new perspectives on secure smart card systems, the role of BS7799 in certification, electronic commerce and smart cards, iris biometrics and many more. AH papers presented at this conference were reviewed by a minimum of two international reviewers. W e wish to express our gratitude to all authors of papers and the international referee board. W e would also like to express our appreciation to the organising committee, chaired by Leon Strous, for aU their inputs and arrangements.

Full Product Details

Author:   Jan H.P. Eloff ,  Les Labuschagne ,  Rossouw von Solms ,  Jan Verschuren
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 1999
Volume:   26
Dimensions:   Width: 15.50cm , Height: 1.40cm , Length: 23.50cm
Weight:   0.403kg
ISBN:  

9781475754834


ISBN 10:   1475754833
Pages:   248
Publication Date:   21 March 2013
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Preface. Acknowledgements. Part one: Reviewed Papers. 1. A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards; R. Weis. 2. Real-time Risk Analysis on the Internet: a prototype; H.S. Venter, et al. 3. A practical approach to manage data communication security; P.H. Samwel, M. Spruit. 4. The Future of Australian & New Zealand Security Standard AS/NZS 4444?; M. Warren, B. Hutchinson. 5. The Effective Utilization of Audit Logs in Information Security Management; W. Olivier, R. von Solms. 6. An approach to standardizing security analysis methods for virtual systems; A. Frisinger, L. Yngstrom. 7. Information Security at Top Level - Securometer® streamlines management information; A. Buren, et al. 8. Risk analysis on Internet connection; M. Spruit, P.H. Samwel. 9. A Secure Station for Network Monitoring and Control; V. Prevelakis. 10. Security aspects of a Java-servlet-based web-hosted e-mail system; E. Hepworth, U. Ultes-Nitsche. 11. Time as an Aid to Improving Security in Smart Cards; V. Cordonnier, et al. 12. The Intranet Authorization Paradigm; M. Vandenwauver, et al. 13. Predicting the Performance of Transactional Electronic Commerce Protocols; M. Berry, et al. Part two: Invited papers. 14. The Cyber-Posture of the National Information Infrastructure; W.H. Ware. 15. Principles of Iris Recognition; M. Negin, M. van der Harst. 16. Designing a Secure System for Implementing Chip Cards in the Financial Services Industry; T. Stanley.17. New models for the management of public key infrastructure and root certification authorities; S. Wilson. 18. A Secure Electronic Commerce Environment: Only with `Smart Cards'; W. Caelli. Index of contributors.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List