Advertisement

Information Security in Research and Business

Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark

  • Louise Yngström
  • Jan Carlsen

Table of contents

  1. Front Matter
    Pages i-xii
  2. Secure Information Systems

  3. Secure Data Bases

    1. Front Matter
      Pages 39-39
    2. Silvana Castano, Maria Grazia Fugini
      Pages 56-67
  4. Management of Information Security and Risks (II)

  5. Secure Group Communication

    1. Front Matter
      Pages 99-99
  6. Secure Commercial Systems (I)

    1. Front Matter
      Pages 111-111
  7. Tools for Intrustion Detection

    1. Front Matter
      Pages 121-121
    2. Ioanna Kantzavelou, Sokratis K. Katsikas
      Pages 123-135
  8. Privacy and Education

    1. Front Matter
      Pages 137-137
    2. E. Jonsson, L. J. Janczewski
      Pages 139-150
    3. Michael Sobirey, Simone Fischer-Hübner, Kai Rannenberg
      Pages 151-163
    4. Martin Reichenbach, Herbert Damker, Hannes Federrath, Kai Rannenberg
      Pages 164-174
  9. Assessment and Evaluation of Secure Systems

    1. Front Matter
      Pages 175-175
    2. Willis H. Ware
      Pages 177-196
    3. J. H. P. Eloff, R. Körner
      Pages 210-221
    4. A. Jøsang, F. Van Laenen, S. J. Knapskog, Joos Vandewalle
      Pages 241-252
  10. Management of Information Security and Risks (II)

    1. Front Matter
      Pages 253-253
    2. O. Tettero, D. J. Out, H. M. Franken, J. Schot
      Pages 255-266
    3. C. Eckert, D. Marek
      Pages 267-279
    4. W. Olivier, H. van de Haar
      Pages 280-292
    5. Klaus Brunnstein
      Pages 293-295
    6. E. Roos Lindgreen, H. R. D. Janus, A. Shahim, G. Hulst, I. S. Herschberg
      Pages 308-318
  11. Cryptopolicies

    1. Front Matter
      Pages 319-319
    2. Louise Yngström, Jan Carlsen
      Pages 321-322
  12. Secure Commercial Systems (II)

  13. Security in Healthcare Systems

    1. Front Matter
      Pages 375-375
    2. M. J. Warren, S. M. Furnell, P. W. Sanders
      Pages 391-402
  14. Secure Communications and Networks

    1. Front Matter
      Pages 415-415
    2. M. Laurent, O. Paul, P. Rolin
      Pages 425-439
    3. Daniele Alberto Galliano, Antonio Lioy, Fabio Maino
      Pages 440-451

About this book

Introduction

Recently, IT has entered all important areas of society. Enterprises, individuals and civilisations all depend on functioning, safe and secure IT. Focus on IT security has previously been fractionalised, detailed and often linked to non-business applicaitons. The aim of this book is to address the current and future prospects of modern IT security, functionality in business, trade, industry, health care and government. The main topic areas covered include existing IT security tools and methodology for modern IT environments, laws, regulations and ethics in IT security environments, current and future prospects in technology, infrastructures, technique and methodology and IT security in retrospective.

Keywords

DEX Information Technology (IT) access control authentication database information information security information system intrusion detection networks object-oriented database privacy systems security technology tool

Editors and affiliations

  • Louise Yngström
    • 1
  • Jan Carlsen
    • 2
  1. 1.Department of Computer and Systems SciencesStockholm UniversityKistaSweden
  2. 2.Data Security Institute of 1977a subsidiary of Coopers & LybrandCopenhagen ODenmark

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-35259-6
  • Copyright Information Springer-Verlag US 1997
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4757-5481-0
  • Online ISBN 978-0-387-35259-6
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site