Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference

Author:   Steve Furnell ,  Paul Dowland ,  Bhavani Thuraisingham ,  X. Sean Wang
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2006
Volume:   193
ISBN:  

9781441940056


Pages:   370
Publication Date:   29 November 2010
Format:   Paperback
Availability:   Out of print, replaced by POD   Availability explained
We will order this item for you from a manufatured on demand supplier.

Our Price $393.36 Quantity:  
Add to Cart

Share |

Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference


Add your own review!

Overview

The proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems address the increasing need for ensuring proper standards of integrity and control in information systems in an organizational context. The aim of this research is to guarantee that data, software, and the business processes are complete, adequate, and valid for the intended functionality and expectations of the owner (i.e. the user organization).

Full Product Details

Author:   Steve Furnell ,  Paul Dowland ,  Bhavani Thuraisingham ,  X. Sean Wang
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2006
Volume:   193
Dimensions:   Width: 15.50cm , Height: 2.00cm , Length: 23.50cm
Weight:   0.599kg
ISBN:  

9781441940056


ISBN 10:   1441940057
Pages:   370
Publication Date:   29 November 2010
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of print, replaced by POD   Availability explained
We will order this item for you from a manufatured on demand supplier.

Table of Contents

Security Standards.- Information Security Standards: Adoption Drivers (Invited Paper).- Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper).- From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper).- Security Culture.- How Much Should We Pay for Security? (Invited Paper).- Do Not Ship, or Receive, Trojan Horses.- Employee Security Perception in Cultivating Information Security Culture.- Access Management.- A Policy Framework for Access Management in Federated Information Sharing.- A Hierarchical Release Control Policy Framework.- Risk Management.- Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC.- The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study.- Risk Communication, Risk Perception and Information Security.- A Holistic Risk Analysis Method for Identifying Information Security Risks.- Security Culture.- A Responsibility Framework for Information Security.- Information Security Governance - A Re-Definition.- Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper).- Security Management.- Measurement of Information Security in Processes and Products.- A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises.- A UML Approach in the ISMS Implementation.- Applications.- Attack Aware Integrity Control in Databases (Invited Abstract).- Characteristics and Measures for Mobile-Masquerader Detection.- A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions.- Access Management.- A Trust-Based Model for Information Integrity in Open Systems.- Scalable Access Policy Administration (Invited Paper).- Semantic Information Infrastructure Protection (Invited Abstract).

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List