Buch, Englisch, Band 26, 248 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 400 g
Reihe: IFIP Advances in Information and Communication Technology
Information Security Management & Small Systems Security
Softcover Nachdruck of the original 1. Auflage 1999
ISBN: 978-1-4757-5483-4
Verlag: Springer US
IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30-October 1, 1999, Amsterdam, The Netherlands
Buch, Englisch, Band 26, 248 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 400 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-1-4757-5483-4
Verlag: Springer US
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Data Warehouse
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Information Retrieval
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsmathematik und -statistik
- Wirtschaftswissenschaften Betriebswirtschaft Management Strategisches Management
- Mathematik | Informatik EDV | Informatik Professionelle Anwendung
Weitere Infos & Material
one — Reviewed papers.- 1. A protocol improvement for High-bandwidth encryption using non-encrypting Smart Cards.- 2. Real-time Risk Analysis on the Internet: a prototype.- 3. A practical approach to manage data communication security.- 4. The Future of Australian & New Zealand Security Standard AS/NZS 4444?.- 5. The Effective Utilization of Audit Logs in Information Security Management.- 6. An approach to standardizing security analysis methods for virtual systems.- 7. Information Security at Top Level — Securometer® streamlines management information.- 8. Risk analysis on Internet connection.- 9. A Secure Station for Network Monitoring and Control.- 10. Security aspects of a Java-servlet-based web-hosted e-mail system.- 11. Time as an Aid to Improving Security in Smart Cards.- 12. The Intranet Authorization Paradigm.- 13. Predicting the Performance of Transactional Electronic Commerce Protocols.- two — Invited papers.- 14. The Cyber-Posture of the National Information Infrastructure.- 15. Principles of Iris Recognition.- 16. Designing a Secure System for Implementing Chip Cards in the Financial Services Industry.- 17. New models for the management of public key infrastructure and root certification authorities.- 18. A Secure Electronic Commerce Environment: Only with “Smart Cards”.- Index of contributors.