Abstract is missing.
- A View of Information Security TomorrowHarold Joseph Highland. 1-11
- The Evolution of IT Security ConvergencePatrick R. Gallagher Jr.. 13-22
- Teaching security basics: The Importance of When and HowViiveke Fåk, Amund Hunstad. 23-30
- The MSc in Information Security at Royal HollowayDieter Gollmann. 31-36
- Information Security in the Small Systems Context: A Framework for UnderstandingGuy G. Gable, Harold Joseph Highland. 37-51
- Developing Awareness, Training and Education: A Cost Effective Tool for Maintaining System IntegrityCorey D. Schou, William V. Maconachy, James Frost. 53-63
- Teaching Computer SecurityMatt Bishop. 65-74
- The Filter Model of Information Security: A Conceptual Model for Education and TrainingA. R. Smith. 75-89
- Shamir s Scheme Says It allEd Dawson, Diane Donovan. 91-102
- LUC: A New Public Key SystemPeter J. Smith, Michael J. J. Lennon. 103-117
- The Encapsulated Security Services Interface (ESSI)Ping Lin. 119-135
- Context-Dependent Access Control in Distributed SystemsHermann Strack, Kwok-Yan Lam. 137-155
- Internal Control by Objectives: The Functional Control MatrixKarl H. Krueger. 157-169
- International Standards and Organizational Security Needs: Bridging the GapC. J. Bosch, Jan H. P. Eloff, John M. Carroll. 171-183
- The Risk Data Repository: A Novel Approach to Security Risk ModellingAlison Anderson, Dennis Longley, Alan B. Tickle. 185-194
- Turning Multiple Evaluated Products into Trusted Systems with AssuranceD. Gambel, J. Fowler. 195-205
- Historical Labels in Open Distributed Systems: An ITSEC/ECMA SpecificationStewart Kowalski. 207-226
- A Model for Organising Information Security DocumentationL. M. du Toit, Sebastiaan H. von Solms. 227-242
- Planning for the EDI of Tomorrow Using Electronic Document AuthorizationSelwyn Russell. 243-251
- The EDP Auditor: Disappearing Or AdaptingGuy G. Gable, Gordon B. Davis. 253-266
- Electronic Data Interface (EDI) Security and Audit: A Practical ApproachIvan Ekebrink. 267-275
- A Generic Security Platform for WorkstationsBjörn Lindberg. 277-285
- Evaluation of an Academic Programme in IT Security 1985-1990Louise Yngström. 287-299
- Fighting the Viruses: Practical Anti-Virus TrainingMikael Larsson. 301-311
- A Quantitative Accreditation Model - Assessing the Value of AssuranceM. Ohlin. 313-325
- Superseding Manual Generation of Access Control Specification - From Policies to ProfilesDalenca Pottas, Sebastiaan H. von Solms. 327-342
- Extending the ISO Access Framework for Multiple PoliciesMarshall D. Abrams, Michael V. Joyce. 343-358
- Evolution of IT Security in India - Implementation IssuesK. Subramanian. 359-367
- Legal Response to a Computer Crime - Retrospect of a Mere Chance CaseJuhani Saari. 369-373
- Information Systems Security and Fraud Prevention in Office Automation SystemsPhilip M. Stanley. 375-383
- A Process Approach to Information Security ManagementRossouw von Solms, Sebastiaan H. von Solms, John M. Carroll. 385-399
- MRA: A Computational Technique for Security in High-Performance SystemsMahdi Abdelguerfi, Andrea Dunham, Wayne Patterson. 401-417