rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781402070303

Security in the Information Society

by ; ;
  • ISBN13:

    9781402070303

  • ISBN10:

    1402070306

  • Format: Hardcover
  • Copyright: 2002-04-01
  • Publisher: Kluwer Academic Pub
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $229.99 Save up to $172.75
  • Digital
    $124.02*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking.Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security;Tools for Information Security.Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt.

Table of Contents

Preface ix
IFIP/SEC2002 Conference Committees xi
Part One Information Security Management
The Effective Implementation of Information Security in Organizations
1(18)
O.A. Hoppe
J. Van Niekerk
R. Von Solms
A Practical Approach to Information Security Awareness in the Organization
19(20)
C. Vroom
R. Von Solms
RBAC Policies in XML for X.509 Based Privilege Management
39(16)
D.W. Chadwick
A. Otenko
A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration
55(12)
A. Ahmad
T. Ruighaver
Elaborating Quantitative Approaches for IT Security Evaluation
67(12)
D. Gritzalis
M. Karyda
L. Gymnopoulos
Part Two Standards of Information Security
A Security Evaluation Criteria for Baseline Security Standards
79(12)
W.J. Brooks
M. Warren
W. Hutchinson
Maturity Criteria for Developing Secure Is and Sw: Limits, and Prospects
91(18)
M.T. Siponen
For a Secure Mobile IP and Mobile IPv6 Deployment
109(12)
M. Laurent-Maknavicius
Part Three Threats and Attacks to Information
Addressing Internet Security Vulnerabilities: A Benchmarking Study
121(12)
A. Alayed
S.M. Furnell
I.M. Barlow
The Threat From Within -- An Analysis of Attacks on an Internal Network
133(14)
J. Haggerty
Q. Shi
M. Merabti
Security Vulnerabilities in Event-Driven Systems
147(14)
S. Xenitellis
Denial of Service: Another Example
161(10)
J. J. Yan
A Detection Scheme for the Sk Virus
171(12)
D. Salah
H.K. Aslan
M.T. El-Hadidi
Part Four Education and Curriculum for Information Security
An Information Security Curriculum in Finland
183(8)
T. Virtanen
R. Addams-Moring
Part Five Social and Ethical Aspects of Information Security
Information Security Culture: The Socio-Cultural Dimension in Information Security Management
191(12)
T. Schlienger
S. Teufel
Information Security Culture
203(12)
A. Martins
J. Eloff
Part Six Information Security Services
Keystroke Analysis as a Method of Advanced User Authentication and Response
215(12)
P.S. Dowland
S.M. Furnell
M. Papadaki
Zero Knowledge Broadcasting Identification Scheme
227(12)
M.S. El-Soudani
H.S. El-Refaey
H.M. Mourad
A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services
239(12)
Li-Sha He
N. Zhang
Li-Rong He
Mandatory Security Policies for Corba Security Model
251(12)
C.M. Westphall
J. Da S. Fraga
C.B. Westphall
S.C.S. Bianchi
Policap-Proposal, Development and Evaluation of a Policy Service and Capabilities for Corba Security
263(12)
C.M. Westphall
J. Da S. Fraga
M.S. Wangham
R.R. Obelheiro
L.C. Lung
Secure Database Connectivity on the WWW
275(12)
M. Coetzee
J. Eloff
Towards Semantic Integrity in Rational Database
287(12)
R.A. Botha
Formal Design of Packet Filtering Systems
299(12)
G. Osman
M.G. Darwish
M. Zaki
Elliptic Curve Cryptosystems on Smart Cards
311(12)
E. Mohammed
A. Emarah
Kh. El-Shennawy
Part Seven Multilateral Security
Establishing Bilateral Anonymous Communication in Open Networks
323(12)
T. Demuth
Part Eight Applications of Information Security
Brits-A Holistic Framework for Hedging Shareholder Value in It Dependent Business
335(12)
C. Magnusson
L. Yngstrom
Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration
347(10)
T. Tryfonas
E. Kiountouzis
An Efficient Hybrid Sealed Bid Auction Protocol
357(16)
R. Abdel-Moneim
S. El-Kassas
H. Hosny
Self-Determination in Mobile Internet: PiMI Prototype Results
373(14)
S. Fischer-Hubner
M. Nilsson
H. Lindskog
Secure Component Distribution Using WebCom
387(12)
S.N. Foley
T.B. Quillinan
J.P. Morrison
E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals
399(12)
R. Uda
M. Ito
K. Awaya
H. Shigeno
Y. Matsushita
An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions
411(12)
D. Critchlow
N. Zhang
Part Nine Infrastructure for Information Security
Secure Selective Exclusion in Ad Hoc Wireless Network
423(12)
R.O. Di Pietro
L.V. Mancini
S. Jajodia
Part Ten Advanced Topics in Security
Optical Network Models for Quantum Cryptography
435(18)
S.T. Faraj
F. Al-Naima
S.Y. Ameen
Part Eleven Legislation for Information Security
A Unified Regulatory Framework on a European Information Society: Suggested Building Levels
453(16)
P.S. Anastasiades
Revisiting Legal and Regulatory Requirements for Secure E-Voting
469(12)
L. Mitrou
D. Gritzalis
S. Katsikas
Part Twelve Modeling and Analysis for Information Security
A Security Incident Data Model
481(14)
M.A. Belsis
N. Godwin
L. Smalov
Security Levels for Contracting Agents
495(12)
A. Meier
S. Rohrig
Functional Requirements for a Secure Electronic Voting System
507(14)
S. Ikonomopoulos
C. Lambrinoudakis
D. Gritzalis
S. Kokolakis
K. Vassiliou
Intelligent IP Packet Filtering
521(14)
M. Hashem
A. Mohamed
M. Wahib
Part Thirteen Tools for Information Security
Human Computer Interaction: An Information Security Perspectives
535(12)
M.M. Eloff
J.H.P. Eloff
A Very Smart Card for Fighting Against Terrorism
547(12)
J. Geneste
Shedel -- A Simple Hierarchical Event Description Language for Specifying Attack Signatures
559(14)
M. Meier
N. Bischof
T. Holz
Propagating Modifications to Mobile Policies
573(12)
K. Smith
D. Faatz
A. Fayad
S. Jajodia
Author Index 585

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program