Advertisement

Security in the Information Society

Visions and Perspectives

  • M. Adeeb Ghonaimy
  • Mahmoud T. El-Hadidi
  • Heba K. Aslan

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 86)

Table of contents

  1. Front Matter
    Pages i-xii
  2. Information Security Management

  3. Standards of Information Security

    1. W. J. Brooks, M. Warren, W. Hutchinson
      Pages 79-89
    2. Maryline Laurent-Maknavicius
      Pages 109-120
  4. Threats and Attacks to Information

    1. A. Alayed, S. M. Furnell, I. M. Barlow
      Pages 121-132
    2. John Haggerty, Qi Shi, Madjid Merabti
      Pages 133-145
    3. Simeon Xenitellis
      Pages 147-160
    4. Jianxin Jeff Yan
      Pages 161-169
    5. Eng. Dalia Salah, Heba K. Aslan, Mahmoud T. El-Hadidi
      Pages 171-182
  5. Education and Curriculum for Information Security

    1. Teemupekka Virtanen, Ronja Addams-Moring
      Pages 183-190
  6. Social and Ethical Aspects of Information Security

    1. Thomas Schlienger, Stephanie Teufel
      Pages 191-201
    2. A. Martins, Jan Elofe
      Pages 203-214
  7. Information Security Services

    1. P. S. Dowland, S. M. Furnell, M. Papadaki
      Pages 215-226
    2. Magdi S. El-Soudani, Heba S. El-Refaey, Hebat-Allah M. Mourad
      Pages 227-237
    3. Carla M. Westphall, Joni S. da Fraga, Carlos B. Westphall, Silvia C. S. Bianchi
      Pages 251-262
    4. Carla M. Westphall, Joni S. da Fraga, Michelle S. Wangham, Rafael R. Obelheiro, Lau C. Lung
      Pages 263-274
    5. Marijke Coetzee, Jan Eloff
      Pages 275-286
    6. Reinhardt A. Botha
      Pages 287-297
    7. G. Osman, M. G. Darwish, M. Zaki
      Pages 299-310
    8. Elsayed Mohammed, A. Emarah, Kh. El-Shennawy
      Pages 311-322
  8. Multilateral Security

  9. Applications of Information Security

    1. Riham Abdel-Moneim, Sherif El-Kassas, Hoda Hosny
      Pages 357-371
    2. Simone Fischer-Hübner, Mikael Nilsson, Helena Lindskog
      Pages 373-386
    3. Simon N. Foley, Thomas B. Quillinan, John P. Morrison
      Pages 387-398
    4. Ryuya Uda, Masahito Ito, Kohei Awaya, Hiroshi Shigeno, Yutaka Matsushita
      Pages 399-410
  10. Infrastructure for Information Security

    1. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
      Pages 423-434
  11. Advanced Topics in Security

    1. Sufyan T. Faraj, Fawzi Al-Naima, Siddeeq Y. Ameen
      Pages 435-451
  12. Legislation for Information Security

  13. Modeling and Analysis for Information Security

    1. Meletis A. Belsis, Nick Godwin, Leon Smalov
      Pages 481-494
    2. Arion Meier, Susanne Röhrig
      Pages 495-506
    3. Spyros Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, Kostas Vassiliou
      Pages 507-519
    4. M. Hashem, A. Mohamed, M. Wahib
      Pages 521-533
  14. Tools for Information Security

    1. M. M. Eloff, J. H. P. Eloff
      Pages 535-545
    2. Jean-François Geneste
      Pages 547-558
    3. Ken Smith, Don Faatz, Amgad Fayad, Sushil Jajodia
      Pages 573-584
    4. M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan
      Pages E1-E1
  15. Back Matter
    Pages 585-586

About this book

Introduction

Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking.

Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics:

  • Information Security Management;
  • Standards of Information Security;
  • Threats and Attacks to Information;
  • Education and Curriculum for Information Security;
  • Social and Ethical Aspects of Information Security;
  • Information Security Services;
  • Multilateral Security;
  • Applications of Information Security;
  • Infrastructure for Information Security
  • Advanced Topics in Security;
  • Legislation for Information Security;
  • Modeling and Analysis for Information Security;
  • Tools for Information Security.

Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt.

Keywords

Denial of Service IPv6 IT security Smart Card configuration data security education evaluation organization tools

Editors and affiliations

  • M. Adeeb Ghonaimy
    • 1
  • Mahmoud T. El-Hadidi
    • 2
  • Heba K. Aslan
    • 3
  1. 1.Ain Shams UniversityEgypt
  2. 2.Cairo UniversityEgypt
  3. 3.Electronic Research InstituteEgypt

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-35586-3
  • Copyright Information IFIP International Federation for Information Processing 2002
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4757-1026-7
  • Online ISBN 978-0-387-35586-3
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site