<p><STRONG>Integrity and Internal Control in Information Systems V</STRONG> represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are: <BR>-To present methods and techn
Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
β Scribed by Jean-Noel Ezingeard, David Birchall (auth.), Paul Dowland, Steve Furnell, Bhavani Thuraisingham, X. Sean Wang (eds.)
- Publisher
- Springer US
- Year
- 2006
- Tongue
- English
- Leaves
- 366
- Series
- IFIP International Federation for Information Processing 193
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.
For more information about IFIP, please visit www.ifip.org.
β¦ Table of Contents
Front Matter....Pages xiii-xiii
Information Security Standards: Adoption Drivers (Invited Paper)....Pages 1-20
Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper)....Pages 21-39
From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper)....Pages 41-55
Front Matter....Pages 57-57
How Much Should We Pay for Security? (Invited Paper)....Pages 59-69
Do Not Ship, or Receive, Trojan Horses....Pages 71-82
Employee Security Perception in Cultivating Information Security Culture....Pages 83-92
Front Matter....Pages 93-93
A Policy Framework for Access Management in Federated Information Sharing....Pages 95-120
A Hierarchical Release Control Policy Framework....Pages 121-137
Front Matter....Pages 139-139
Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC....Pages 141-156
The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study....Pages 157-173
Risk Communication, Risk Perception and Information Security....Pages 175-184
A Holistic Risk Analysis Method for Identifying Information Security Risks....Pages 185-202
Front Matter....Pages 203-203
A Responsibility Framework for Information Security....Pages 205-221
Information Security Governance - A Re-Definition....Pages 223-236
Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper)....Pages 237-245
Front Matter....Pages 247-247
Measurement of Information Security in Processes and Products....Pages 249-265
A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises....Pages 267-283
A UML Approach in the ISMS Implementation....Pages 285-297
Front Matter....Pages 299-299
Attack Aware Integrity Control in Databases (Invited Abstract)....Pages 301-301
Characteristics and Measures for Mobile-Masquerader Detection....Pages 303-318
Front Matter....Pages 299-299
A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions....Pages 319-333
Front Matter....Pages 335-335
A Trust-Based Model for Information Integrity in Open Systems....Pages 337-354
Scalable Access Policy Administration (Invited Paper)....Pages 355-370
Semantic Information Infrastructure Protection (Invited Abstract)....Pages 371-371
β¦ Subjects
Computer Science, general; System Performance and Evaluation; Models and Principles; Management of Computing and Information Systems
π SIMILAR VOLUMES
<p>The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, IT personnel and auditors. Since its beginning in 1997, the IICIS international working conference has focused on the following questions: what prec
<p>The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security), jointly presented by WG 11.1 and WG 11.2 of the International Federation for Information Processing {IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference
<p>Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information systems security remains a key topic in businesses and in the public sector, with implications for
<p><em>Integrity and Internal Control in Information Systems</em> is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective bus
The more our society relies on electronic forms of communication, the more the security of these communication networks is essential for its well-functioning. As a consequence, research on methods and techniques to improve network security is extremely important. <br/> Topics in this volume include