This book constitutes the refereed proceedings of the 8th Conference of IFIP WG 3.7 held in Darwin, Australia in July 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer
Information Security Management, Education and Privacy (IFIP International Federation for Information Processing)
β Scribed by Yves Deswarte, FrAΒ©dAΒ©ric Cuppens, Sushil Jajodia, Lingyu Wang
- Year
- 2004
- Tongue
- English
- Leaves
- 328
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This volume contains the papers presented at three workshops embedded in the 19th IFIP International Conference on Information Security (SEC2004), which was sponsored by the International Federation for Information Processing (IFIP) and held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The first workshop was organized by IFIP Working Group 11.1, which is itself dedicated to Information Security Management, i.e., not only to the practical implementation of new security technology issued from recent research and development, but also and mostly to the improvement of security practice in all organizations, from multinational corporations to small enterprises. Methods and techniques are developed to increase personal awareness and education in security, analyze and manage risks, identify security policies, evaluate and certify products, processes and systems. The second workshop was organized by IFIP Working Group 11.8, dedicated to Information Security Education. This year, the workshop was aimed at developing a first draft of an international doctorate program allowing a specialization in IT Security. The draft is based upon selected papers from individuals or groups (from academic, military and government organizations), and discussions at the workshop. This draft will be further refined and eventually published as an IFIP Report. Finally, the last workshop was organized by IFIP Working Group 11.4 on Network Security. The purpose of the workshop was to bring together privacy and anonymity experts from around the world to discuss recent advances and new perspectives on these topics that are increasingly important aspects in electronic services, especially in advanced distributed applications, such as m-commerce, agent-based systems, P2P, etc. The carefully selected papers gathered in this volume show the richness of the information security domain, as well as the liveliness of the working groups cooperating in the IFIP Technical Committee 11 on Security and Protection in Information Processing Systems. Information Security Management, Education and Privacy is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.
β¦ Table of Contents
Preliminaries......Page 1
Contents......Page 6
Preface......Page 10
Corporate Information Security Education......Page 18
Towards Corporate Information Security Obedience......Page 34
CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection......Page 48
A Framework For Role-based Monitoring of Insider Misuse......Page 66
Update/Patch Management Systems......Page 82
Investigating a Smart Technology......Page 96
Laboratory Support for Information Security Education......Page 116
An Holistic Approach to an International Doctoral Program......Page 132
A New Paradigm for Information Security Education at Doctoral Level......Page 148
Highly Qualified Information Security Personnel Training In Russia......Page 156
Doctor of Philosophy: IT Security......Page 162
Doctoral Programme on Information and Communication Systems......Page 168
An International Security Perspective......Page 174
Do Military Forces Need Ph.D.s?......Page 180
A Doctoral Program with Specialization in Information Security......Page 188
A Security Model for Anonymous Credential Systems......Page 198
Private Information Storage with Logarithm-Space Secure Hardware......Page 216
Taxonomy of Mixes and Dummy Traffic......Page 232
Identity Management for Self-Portrayal......Page 248
Privacy Preserving Online Reputation Systems......Page 264
A Risk Driven Approach to Designing Privacy Enhanced Secure......Page 280
Privacy Invasive Software in File-Sharing Tools......Page 296
Infusing Privacy Norms in DRM β Incentives and Perspectives......Page 312
π SIMILAR VOLUMES
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer application
This book is the first volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing researc
This volume presents findings and insights from contemporary thinking and research about alternative and new ways that computerised information systems might be designed and used to support the improvement of educational institutions. Many pathways are identified although expansion of access to