These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented covering a wide range of subjects including current industry expectations and current research aspects. The evolutionary development of information security as a professional and research discipline was discussed along with security in open distributed systems and security in groupware.
These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented covering a wide range of subjects including current industry expectations and current research aspects. The evolutionary development of information security as a professional and research discipline was discussed along with security in open distributed systems and security in groupware.
Produktdetails
Produktdetails
IFIP Advances in Information and Communication Technology
Invited talk 1: Security should pay: it should not cost. Information security and business applications 1. Information security standards. Invited talk 2: Encryption policy for the global information infrastructure. Management of information security 1. Cryptography, key management schemes and mobile computing. Invited talk 3: A new framework for information security to avoid information anarchy. Information security and groupware. Building secure applications. Invited talk 4: Functional and operational security system for open distributed environments. Open distributed security 1. Management of information security 2. Open distributed security 2. Invited talk 5: Viruses, corruption, denial, disruption and information assurance. Access control. Legal, ethical and social issues of information security. Appendixes. Index of contributors.
Invited talk 1: Security should pay: it should not cost. Information security and business applications 1. Information security standards. Invited talk 2: Encryption policy for the global information infrastructure. Management of information security 1. Cryptography, key management schemes and mobile computing. Invited talk 3: A new framework for information security to avoid information anarchy. Information security and groupware. Building secure applications. Invited talk 4: Functional and operational security system for open distributed environments. Open distributed security 1. Management of information security 2. Open distributed security 2. Invited talk 5: Viruses, corruption, denial, disruption and information assurance. Access control. Legal, ethical and social issues of information security. Appendixes. Index of contributors.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826