SEC 1993:
Toronto,
Canada
E. Graham Dougall (Ed.):
Computer Security, Proceedings of the IFIP TC11, Ninth International Conference on Information Security, IFIP/Sec '93, Toronto, Canada, 12-14 May 1993.
IFIP Transactions A-37 North-Holland 1993, ISBN 0-444-81748-4 BibTeX
@proceedings{DBLP:conf/sec/1993,
editor = {E. Graham Dougall},
title = {Computer Security, Proceedings of the IFIP TC11, Ninth International
Conference on Information Security, IFIP/Sec '93, Toronto, Canada,
12-14 May 1993},
booktitle = {SEC},
publisher = {North-Holland},
series = {IFIP Transactions},
volume = {A-37},
year = {1993},
isbn = {0-444-81748-4},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Harold Joseph Highland:
A View of Information Security Tomorrow.
1-11 BibTeX
- Patrick R. Gallagher Jr.:
The Evolution of IT Security Convergence.
13-22 BibTeX
- Viiveke Fåk, Amund Hunstad:
Teaching security basics: The Importance of When and How.
23-30 BibTeX
- Dieter Gollmann:
The MSc in Information Security at Royal Holloway.
31-36 BibTeX
- Guy G. Gable, Harold Joseph Highland:
Information Security in the Small Systems Context: A Framework for Understanding.
37-51 BibTeX
- Corey D. Schou, William V. Maconachy, James Frost:
Developing Awareness, Training and Education: A Cost Effective Tool for Maintaining System Integrity.
53-63 BibTeX
- Matt Bishop:
Teaching Computer Security.
65-74 BibTeX
- A. R. Smith:
The Filter Model of Information Security: A Conceptual Model for Education and Training.
75-89 BibTeX
- Ed Dawson, Diane Donovan:
Shamir's Scheme Says It all.
91-102 BibTeX
- Peter J. Smith, Michael J. J. Lennon:
LUC: A New Public Key System.
103-117 BibTeX
- Ping Lin:
The Encapsulated Security Services Interface (ESSI).
119-135 BibTeX
- Hermann Strack, Kwok-Yan Lam:
Context-Dependent Access Control in Distributed Systems.
137-155 BibTeX
- Karl H. Krueger:
Internal Control by Objectives: The Functional Control Matrix.
157-169 BibTeX
- C. J. Bosch, Jan H. P. Eloff, John M. Carroll:
International Standards and Organizational Security Needs: Bridging the Gap.
171-183 BibTeX
- Alison Anderson, Dennis Longley, Alan B. Tickle:
The Risk Data Repository: A Novel Approach to Security Risk Modelling.
185-194 BibTeX
- D. Gambel, J. Fowler:
Turning Multiple Evaluated Products into Trusted Systems with Assurance.
195-205 BibTeX
- Stewart Kowalski:
Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification.
207-226 BibTeX
- L. M. du Toit, Sebastiaan H. von Solms:
A Model for Organising Information Security Documentation.
227-242 BibTeX
- Selwyn Russell:
Planning for the EDI of Tomorrow Using Electronic Document Authorization.
243-251 BibTeX
- Guy G. Gable, Gordon B. Davis:
The EDP Auditor: Disappearing Or Adapting.
253-266 BibTeX
- Ivan Ekebrink:
Electronic Data Interface (EDI) Security and Audit: A Practical Approach.
267-275 BibTeX
- Björn Lindberg:
A Generic Security Platform for Workstations.
277-285 BibTeX
- Louise Yngström:
Evaluation of an Academic Programme in IT Security 1985-1990.
287-299 BibTeX
- Mikael Larsson:
Fighting the Viruses: Practical Anti-Virus Training.
301-311 BibTeX
- M. Ohlin:
A Quantitative Accreditation Model - Assessing the Value of Assurance.
313-325 BibTeX
- Dalenca Pottas, Sebastiaan H. von Solms:
Superseding Manual Generation of Access Control Specification - From Policies to Profiles.
327-342 BibTeX
- Marshall D. Abrams, Michael V. Joyce:
Extending the ISO Access Framework for Multiple Policies.
343-358 BibTeX
- K. Subramanian:
Evolution of IT Security in India - Implementation Issues.
359-367 BibTeX
- Juhani Saari:
Legal Response to a Computer Crime - Retrospect of a "Mere Chance" Case.
369-373 BibTeX
- Philip M. Stanley:
Information Systems Security and Fraud Prevention in Office Automation Systems.
375-383 BibTeX
- Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll:
A Process Approach to Information Security Management.
385-399 BibTeX
- Mahdi Abdelguerfi, Andrea Dunham, Wayne Patterson:
MRA: A Computational Technique for Security in High-Performance Systems.
401-417 BibTeX
Copyright © Sat May 16 23:37:18 2009
by Michael Ley (ley@uni-trier.de)