情報社会におけるセキュリティ(会議録)<br>Security in the Information Society : Visions and Perspectives (IFIP Advances in Information and Communication Technology 86) (2002. 598 S. 235 mm)

個数:

情報社会におけるセキュリティ(会議録)
Security in the Information Society : Visions and Perspectives (IFIP Advances in Information and Communication Technology 86) (2002. 598 S. 235 mm)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 586 p.
  • 言語 ENG
  • 商品コード 9781402070303

基本説明

Topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; and more.

Full Description

Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking.

Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics:

Information Security Management;
Standards of Information Security;
Threats and Attacks to Information;
Education and Curriculum for Information Security;
Social and Ethical Aspects of Information Security;
Information Security Services;
Multilateral Security;
Applications of Information Security;
Infrastructure for Information Security
Advanced Topics in Security;
Legislation for Information Security;
Modeling and Analysis for Information Security;
Tools for Information Security.

Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt.

Contents

Preface. IFIP/SEC2002 Conference Committees.
Part One: Information Security Management. 1. The Effective Implementation of Information Security in Organizations; O.A. Hoppe, J. Van Niekerk, R. Von Solms. 2. A Practical Approach to Information Security Awareness in the Organization; C. Vroom, R. Von Solms. 3. RBAC Policies in XML for X.509 Based Privilege Management; D.W. Chadwick, A. Otenko. 4. A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration; A. Ahmad, T. Ruighaver. 5. Elaborating Quantitative Approaches for IT Security Evaluation; D. Gritzalis, M. Karyda, L. Gymnopoulos.
Part Two: Standards of Information Security. 6. A Security Evaluation Criteria for Baseline Security Standards; W.J. Brooks, M. Warren, W. Hutchinson. 7. Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects; M.T. Siponen. 8. For a Secure Mobile IP and Mobile IPv6 Deployment; M. Laurent-Maknavicius.
Part Three: Threats and Attacks to Information. 9. Addressing Internet Security Vulnerabilities: A Benchmarking Study; A. Alayed, S.M. Furnell, I.M. Barlow. 10. The Threat From Within -An Analysis of Attacks on anInternal Network; J. Haggerty, Q. Shi, M. Merabti. 11. Security Vulnerabilities in Event-Driven Systems; S. Xenitellis. 12. Denial of Service: Another Example; J.J. Yan. 13. A Detection Scheme for the SK Virus; D. Salah, H.K. Aslan, M.T. El-Hadidi.
Part Four: Education and Curriculum for Information Security. 14. An Information Security Curriculum in Finland; T. Virtanen, R. Addams-Moring.
Part Five: Social and Ethical Aspects of Information Security. 15. Information Security Culture: The Socio-Cultural Dimension in Information Security Management; T. Schlienger, S. Teufel. 16. Information Security Culture; A. Martins, J. Eloff.
Part Six: Information Security Services. 17. Keystroke Analysis as a Method of Advanced User Authentication and Response; P.S. Dowland, S.M. Furnell, M. Papadaki. 18. Zero Knowledge Broadcasting Identification Scheme; M.S. El-Soudani, H.S. El-Refaey, H.M. Mourad. 19. A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services; Li-Sha He, N. Zhang, Li-Rong He. 20. Mandatory Security Policies for CORBA Security Model; C.M. Westphall, J. Da S. Fraga, C.B. Westphall, S.C.S. Bianchi. 21. Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security; C.M. Westphall, J. Da S. Fraga, M.S. Wangham, R.R. Obelheiro, L.C. Lung. 22. Secure Database Connectivity on the WWW; M. Coetzee, J. Eloff. 23. Towards Semantic Integrity in Rational Databases; R.A. Botha. 24. Formal Design of Packet Filtering Systems; G. Osman, M.G. Darwish, M. Zaki. 25. Elliptic Curve Cryptosystems on Smart Cards; E. Mohammed, A. Emarah, Kh. El-Shennawy.
Part Seven: Multilateral Security. 26. Establishing Bilateral Anonymous Communication in Open Networks; T. Demuth.
Part Eight: Applications of Information Security. 27. BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business;