Amazing Books
Temporary Blank

Monday, May 9, 2011

Information Security Management, Education and Privacy






Contents
Preface ix
10th IFIP WG 11.1 Annual Working Conference on Information
Security Management Program Committees xi
IFIP TC11 WG 11.8 – Information Security Education Workshiop
Program Committees xii
I-NetSec04 3rd Working Conference on Privacy and Anonymity in
Networked and Distributed Systems Program Committees xiii
PART ONE: 10th IFIP WG 11.1 Annual Working Conference
on Information Security Management
Corporate Information Security Education: Is Outcomes Based
Education the Solution?
J.V. NIEKERK, R.V. SOLMS 3
Towards Corporate Information Security Obedience
K.L. THOMSONA AND R. VON SOLMS 19
CIIP-RAM - A Security Risk Analysis Methodology for Critical
Information Infrastructure Protection
T.B. BUSUTTIL, M.J. WARREN 33
A Framework For Role-based Monitoring of Insider Misuse
51
A.H. PHYO, S.M. FURNELL, F. PORTILLA
Update/Patch Management Systems: A Protocol Taxonomy with
Security Implications
67
A. COLARIK, C. THOMBORSON, L. JANCZEWSKI
Investigating a Smart Technology
81
K. O’SULLIVAN, K. NEVILLE, C. HEAVIN
PART TWO: IFIP TC11 WG 11.8 – Information
Security Education Workshop
Laboratory Support for Information Security Education
101
N. MILOSLAVSKAIA, A. TOLSTOI, D. USHAKOV
An Holistic Approach to an International Doctoral Program
117
L. YNGSTRĂ–M
A New Paradigm for Information Security Education at
Doctoral Level
N. JAYARATNA 133
Highly Qualified Information Security Personnel Training
in Russia
141
V. GORBATOV, A. MALUK, N MILOSLAVSKAYA, A. TOLSTOY
Doctor of Philosophy: IT Security
J. SLAY 147
Doctoral Programme on Information and Communication Systems
Security at the University of the Aegean
S. KATSIKAS 153
An International Security Perspective
159
G. QUIRCHMAYR
Do Military Forces Need Ph.D.s?
R. DODGE 165
A Doctoral Program with Specialization in Information Security:
A High Assurance Constructive Security Approach
C. IRVINE, T. LEVIN 173
PART THREE: I-NetSec04 3rd Working Conference on
Privacy and Anonymity in Networked
and Distributed Systems
A Security Model for Anonymous Credential Systems
A. PASHALIDIS, C.J. MITCHELL 183
Private Information Storage with Logarithm-Space Secure Hardware
A. ILIEV, S. SMITH 201
Taxonomy of Mixes and Dummy Traffic
C. DIAZ, B. PRENEEL 217
Identity Management for Self-Portrayal
T. BAIER, C.P. KUNZE 233
Privacy Preserving Online Reputation Systems
M. VOSS 249
A Risk Driven Approach to Designing Privacy Enhanced Secure
E.V. HERREWEGHEN 265
Privacy Invasive Software in File-Sharing Tools
A. JACOBSSON, M. BOLDT, B. CARLSSON 281
Infusing Privacy Norms in DRM – Incentives and Perspectives
A. CAMERON 297


Another Computer Security Books
Download

No comments:

Post a Comment

Related Posts with Thumbnails
There was an error in this gadget

Put Your Ads Here!
There was an error in this gadget