SEC 1992:
Singapore
Guy G. Gable, William J. Caelli (Eds.):
IT Security: The Need for International Cooperation, Proceedings of the IFIP TC11, Eigth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992.
IFIP Transactions A-15 North-Holland 1992, ISBN 0-444-89699-6 @proceedings{DBLP:conf/sec/1992,
editor = {Guy G. Gable and
William J. Caelli},
title = {IT Security: The Need for International Cooperation, Proceedings
of the IFIP TC11, Eigth International Conference on Information
Security, IFIP/Sec '92, Singapore, 27-29 May 1992},
booktitle = {SEC},
publisher = {North-Holland},
series = {IFIP Transactions},
volume = {A-15},
year = {1992},
isbn = {0-444-89699-6},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Keynote and Invited Papers
- Wayne Madsen:
International Information Technology (IT) Security Cooperation into the 21st Century.
5-12
- Alan Reed:
Computer Disasters: The Impact on Business in the 1990's.
13-21
- Teck Soon Chew:
ASEAN - Computer Crime and Corrective Action: A Status Report.
23-33
Security Management 1
- John G. Beatson:
Information Security: The Impact of End User Computing.
35-45
- Steen Bentzen:
PRAJORIS: A Pragmatic 'Joint' Method for Raising the Information Security Level in a Company.
47-60
- Alan K. Stanley:
The Status of IT Security in Leading European Organisations.
61-72
- Per Hoving, Mats Ohlin, Jan Rylander:
Findings of the Swedish CITI Project on Information Technology Security Evaluation and Certification.
73-85
Network Security
Keynote and Invited Papers
Security Management 2
IS Audit
- Dieter Fink:
How Expert are Auditors in the Computer Security Field? South African Findings and Interpretations.
205-219
- Charlie Soh, Guy G. Gable:
IS Audit Research: A Paradigm and A Framework.
221-234
Cryptography
Computer Crime 1
Keynote and Invited Papers
Database Security
UNIX Security
- Craig Rubin:
The New Security Paradigm in the Enterprise Computing Environment.
385-394
- Kevin H. Brady:
Integrating B2 Security into a UNIX System.
395-408
Access Control/Detection
Computer Crime 2
- Bengt Angerfelt:
Computer Crimes: A Study of Different Types of Offences and Offenders.
463-474
- Michael R. Jones:
Dealing with Computer Misuse - The Need for an International Approach.
475-489
Copyright © Sun Mar 14 23:23:59 2010
by Michael Ley (ley@uni-trier.de)