The Resource Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference, edited by Paul Dowland ... [et.al.]

Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference, edited by Paul Dowland ... [et.al.]

Label
Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
Title
Security management, integrity, and internal control in information systems
Title remainder
IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
Statement of responsibility
edited by Paul Dowland ... [et.al.]
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
QU
Dewey number
005.8068
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I468 2004
Literary form
non fiction
Nature of contents
bibliography
Series statement
  • International Federation for Information Processing (Series)
  • International Federation for Information Processing
Series volume
  • 193
  • 193
Label
Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference, edited by Paul Dowland ... [et.al.]
Publication
Bibliography note
Includes bibliographical references and author index
http://library.link/vocab/branchCode
  • net
Contents
Machine derived contents note: Session 1 - Security Standards -- Information Security Standards: Adoption Drivers (Invited Paper) 1 -- JEAN-NOEL EZINGEARD AND DAVID BIRCHALL -- Data Quality Dimensions for Information Systems Security: -- A Theorectical Exposition (Invited Paper) 21 -- GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN -- From XML to RDF: Syntax, Semantics, Security, and Integrity -- (Invited Paper) 41 -- C. FARKAS, V. GOWADIA, A. JAIN, AND D. ROY -- Session 2 - Security Culture (I) -- How much should we pay for security? (Invited Paper) 59 -- SOKRATIS K. KATSIKAS, ATHANASIOS N. YANNACOPOULOS, -- STEFANOS GRITZALIS, COSTAS LAMBRINOUDAKIS, -- AND PETER HATZOPOULOS -- Do Not Ship, o0 Receive, Trojan Horses 71 -- COREY HIRSCH -- Employee Security Perception in Cultivating Information Security Culture -- OMAR ZAKARIA 83 -- Session 3 - Access Management (I) -- A Policy Framework for Access Management in Federated Information -- Sharing 95 -- RAFAE BHATTI, ELISA BERTINO, ARIF GHAFOOR -- A Hierarchical Release Control Policy Framework 121 -- CHAO YAO, WILLIAM H. WINSBOROUGH, AND SUSHIL JAJODIA -- Session 4 - Risk Management -- Managing Uncertainty in Security Risk Model Forcasts with RAPSA/MC -- JAMES R. CONRAD, PAUL OMAN, AND CAROL TAYLOR 141 -- The Mitigation of ICT Risks Using EMitl Tool: An Empirical Study 157 -- JABIRI KUWE BAKARI, CHRISTER MAGNUSSON, -- CHARLES N. TARIMO, AND LOUISE YNGSTROM -- Risk Communication, Risk Perception and Information Security 175 -- MALCOLM PATTINSON AND GRANTLEY ANDERSON -- A Holistic Risk Analysis Method for Identifying Information Security Risks -- JANINE L. SPEARS 185 -- Session 5 - Security Culture (II) -- A Responsibility Framework for Information Security 205 -- SHAUN POSTHUMUS AND ROSSOUW VON SOLMS -- Information Security Governance - a Re-definition 223 -- RAHUL RASTOGI AND RosSOUW VON SOLMS -- Can We Tune Information Security Management into Meeting Corporate -- Governance Needs? (Invited Paper) 237 -- LOUISE YNGSTROM -- Session 6 - Security Management -- Measurement of Information Security in Processes and Products 249 -- REIJO SAVOLA, JUHANI ANTTILA, ANNI SADEMIES, -- JORMA KAJAVA, AND JARKKO HOLAPPA -- A Protection Profiles Approach to Risk Analysis for Small and Medium -- Enterprises 267 -- VASSILIS DIMOPOULOS AND STEVEN FURNELL -- A UML Approach in the ISMS Implementation 285 -- ANDRZEJ BIALAS -- Session 7 - Applications -- Attack Aware Integrity Control in Databases (Invited Abstract) 301 -- PENG LIU -- Characteristics and Measures for Mobile-Masquerader Detection 303 -- OLEKSIY MAZHELIS, AND SEPPO PUURONEN -- A Distributed Service Registry for Resource Sharing Among Ad-hoc -- Dynamic Coalitions (Invited Paper) 319 -- RAVI MUKKAMALA, VIJAYALAKSHMI ATLURI, AND JANICEWARNER -- Session 8 - Access Management (II) -- A Trust-based Model for Information Integrity in Open Systems 337 -- YANJUN ZUO AND BRAJENDRA PANDA -- Scalable Access Policy Administration (Invited Paper) 355 -- ARNON ROSENTHAL -- Semantic Information Infrastructure Protection (Invited Abstract) 371 -- PAUL THOMPSON -- 373
Control code
000040502057
Dimensions
25 cm
Extent
xi, 370 p.
Isbn
9780387298269
Lccn
2005934522
Other control number
9780387298266
Other physical details
ill.
http://library.link/vocab/recordID
.b24039342
System control number
  • (OCoLC)63197117
  • springer0387298266

Library Locations

    • Deakin University Library - Geelong Waurn Ponds CampusBorrow it
      75 Pigdons Road, Waurn Ponds, Victoria, 3216, AU
      -38.195656 144.304955
Processing Feedback ...