default search action
SEC 1997: Copenhagen, Denmark
- Louise Yngström, Jan Carlsen:
Information Security in Research and Business, Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC '97), 14-16 May 1997, Copenhagen, Denmark. IFIP Conference Proceedings 92, Chapman & Hall 1997, ISBN 0-412-81780-2
Secure Information Systems
- Alan K. Stanley:
Information security - challenges for the next millennium. SEC 1997: 3-8 - C. P. Louwrens, Sebastiaan H. von Solms:
Selection of secure single sign-on solutions for heterogeneous computing environments. SEC 1997: 9-24 - Jussipekka Leiwo, Yuliang Zheng:
A formal model to aid documenting and harmonizing of information security requirements. SEC 1997: 25-38
Secure Data Bases
- Masha Gendler-Fishman, Ehud Gudes:
A compile-time model for safe information flow in object-oriented databases. SEC 1997: 41-55 - Silvana Castano, Maria Grazia Fugini:
Deriving Authorizations from Process Analysis in Legacy Information Systems. SEC 1997: 56-67
Management of Information Security and Risks (I)
- Mads Bryde Andersen:
The role of government in creating the IT security infrastructure: builder or bystander? SEC 1997: 71-77 - Lam-for Kwok, Dennis Longley:
Code of Practice: A Standard for Information Security Management. SEC 1997: 78-90 - Rossouw von Solms:
Can security baselines replace risk analysis? SEC 1997: 91-98
Secure Group Communication
- Andrew Hutchison:
gGSS-API: a group enhanced generic security service. SEC 1997: 101-110
Secure Commercial Systems (I)
- Per Furberg:
Electronic document exchange in Sweden - the legal aspects. SEC 1997: 113-119
Tools for Intrusion Detection
- Ioanna Kantzavelou, Sokratis K. Katsikas:
An attack detection system for secure computer systems - outline of the solution. SEC 1997: 123-135
Privacy and Education
- Erland Jonsson, Lech J. Janczewski:
A taxonomy and overview of information security experiments. SEC 1997: 139-150 - Michael Sobirey, Simone Fischer-Hübner, Kai Rannenberg:
Pseudonymous audit for privacy enhanced intrusion detection. SEC 1997: 151-163 - Martin Reichenbach, Herbert Damker, Hannes Federrath, Kai Rannenberg:
Individual management of personal reachability in mobile communication. SEC 1997: 164-174
Assessment and Evaluation of Secure Systems
- Willis H. Ware:
New vistas on info-system security. SEC 1997: 177-196 - R. Kruger, Jan H. P. Eloff:
A common criteria framework for the evaluation of information technology systems security. SEC 1997: 197-209 - Jan H. P. Eloff, R. Körner:
A methodology for accrediting a commercial distributed database. SEC 1997: 210-221 - A. van Rensburg, Sebastiaan H. von Solms:
A comparison of schemes for certification authorities/trusted third parties. SEC 1997: 222-240 - Audun Jøsang, F. Van Laenen, Svein J. Knapskog, Joos Vandewalle:
How to trust systems. SEC 1997: 241-252
Management of Information Security and Risks (II)
- O. Tettero, D. J. Out, Henry M. Franken, J. Schot:
Integrating information security in the development of telematics systems. SEC 1997: 255-266 - Claudia Eckert, D. Marek:
Developing secure applications: a systematic approach. SEC 1997: 267-279 - W. Olivier, Helen van de Haar:
Controlling Internet access at an educational institution. SEC 1997: 280-292 - Klaus Brunnstein:
Analysis of Java security and hostile applets. SEC 1997: 293-295 - Richard L. Baskerville:
New organizational forms for information security management. SEC 1997: 296-307 - Edo Roos Lindgreen, H. R. D. Janus, A. Shahim, G. Hulst, I. S. Herschberg:
Security when outsourcing: concepts, constructs, compliance. SEC 1997: 308-318
Cryptopolicies
- The IFIP TC11 position on cryptopolicies. SEC 1997: 321-322
Secure Commercial Systems (II)
- Klaus Brunnstein:
Towards a holistic view of security and safety of enterprise information and communication technologies: adapting to a changing paradigm. SEC 1997: 325-336 - Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson:
A taxonomy of electronic cash schemes. SEC 1997: 337-348 - Andreu Riera, Joan Borrell, Josep Rifà:
Large scale elections by coordinating electoral colleges. SEC 1997: 349-362 - Claudia Eckert, Th. Stoesslein:
MVS-SAT: a security administration tool to support SMF protocol data evaluation. SEC 1997: 363-374
Security in Healthcare Systems
- Bernd Blobel:
Security requirements and solutions in distributed electronic health records. SEC 1997: 377-390 - Matthew J. Warren, Steven Furnell, Peter W. Sanders:
ODESSA - a new approach to healthcare risk analysis. SEC 1997: 391-402 - Ralph Holbein, Stephanie Teufel, Othmar Morger, Kurt Bauknecht:
A comprehensive need-to-know access control system and its application for medical information systems. SEC 1997: 403-414
Secure Communications and Networks
- R. Nelson:
The future of networks and network security. SEC 1997: 417-424 - Maryline Laurent, Olivier Paul, Pierre Rolin:
Securing communications over ATM networks. SEC 1997: 425-439 - Daniel Alberto Galliano, Antonio Lioy, Fabio Maino:
Non-intrusive authentication. SEC 1997: 440-451 - P. W. J. van Zyl, Sebastiaan H. von Solms:
Roaming security agents enabling intelligent access control and network protection. SEC 1997: 452-468
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.