Abstract is missing.
- A practical solution to the complex human issues of information security designJean Hitchings. 3-12
- The use of business process models for security design in organisationsRalph Holbein, Stephanie Teufel, Kurt Bauknecht. 13-22
- An analyst s view of IS securityEvangelos A. Kiountouzis, Spyros Kokolakis. 23-35
- Location management strategies increasing privacy in mobile communicationDogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann. 39-48
- ID-based authentication for mobile conference callShiuh-Jeng Wang, Le-Pond Chin, Jin-Fu Chang, Yuh-Ren Tsai. 49-58
- New security paradigms: orthodoxy and heresyHilary H. Hosmer. 61-73
- Security assurance in information systemsRichard G. Wilsher, Helmut Kurth. 74-87
- A framework for dealing with and specifying security requirements in information systemsEric Dubois, Suchun Wu. 88-99
- The effects of time on integrity in information systemsWilliam List. 100-107
- EPHOS security: procurement of secure open systemsN. H. Pope, J. G. Ross. 111-121
- Canada s computer crime laws: ten years of experienceMartin P. J. Kratz. 122-141
- Delivery and installation of software: disputes and the burden of proofLuc Golvers. 142-150
- Information security on the electronic superhighwaySebastiaan H. von Solms. 153-166
- A taxonomy for analyzing hazards to information systemsRichard Baskerville. 167-176
- Models and tools for quantitative assessment of operational securityMarc Dacier, Yves Deswarte, Mohamed Kaâniche. 177-186
- Activating dynamic counter measures to reduce riskLes Labuschagne, Jan H. P. Eloff. 187-196
- Distributed registration and key distribution (DiRK)Rolf Oppliger, Andres Albanese. 199-208
- On the reconstruction of shared secretsHe Jingmin, Ed Dawson. 209-218
- A hierarchical threshold scheme with unique partial keysHannes Hassler, Vesna Hassler, Reinhard Posch. 219-226
- Efficient and provably secure key agreementNikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, D. Peppes. 227-236
- Internetwork access control using public key certificatesHyun Park, Randy Chow. 237-246
- The security architecture of IRO-DBWolfgang Eßmayr, Fritz Kastner, Günther Pernul, A. Min Tjoa. 249-258
- Securely executing multilevel transactionsS. Jadodia, K. P. Smith, Barbara T. Blaustein, LouAnna Notargiacomo. 259-270
- A decentralized temporal autoritzation modelElisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati. 271-280
- Applications of keystroke analysis for improved login security and continuous user authenticationSteven Furnell, Joseph P. Morrissey, Peter W. Sanders, Colin T. Stockel. 283-294
- MoFAC: a model for fine-grained access controlJohan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms. 295-305
- A discretionary security model for object oriented environmentsWilna Jansen van Rensburg, Martin S. Oliver. 306-316
- Intention modelling: approximating computer user intentions for detection and prediction of intrusionsThomas Spyrou, John Darzentas. 319-336
- An attack detection system for secure computer systems - design of the ADSI. Kantzavelou, A. Patel. 337-347
- IT security and privacy educationLouise Yngström. 351-364
- A human approach to security management in health careH. James, K. Andronis, William Paul. 365-376
- Security enforcement in a European medical device vigilance system networkGeorge Vassilacopoulos, Vassilios Chrissikopoulos, D. Peppes. 377-386
- Design of secure medical database systemsGeorge Pangalos, Marie Khair. 387-401
- Evaluation of the security of distributed IT sytems through ITSEC/ITSEM: experiences and findingsIan Uttridge, Gualtiero Bazzana, Massimo Giunchi, Gemma Deler, Stéphane Geyres, Josef Heiler. 405-416
- SNMP-based network security management using a temporal database approachTheodore K. Apostolopoulos, Victoria C. Daskalou. 417-427
- Security profile for interconnected open distributed systems with varying vulnerabilityNikitas Nikitakos, Stefanos Gritzalis, Panagiotis Georgiadis. 428-437
- A model for the detection of the message stream delay attackSean O Connell, A. Patel. 438-451
- Security model for distributed object framework and its applicability to CORBAVijay Varadharajan, Thomas Hardjono. 452-463
- Software quality assurance: the underlying framework for achieving secure and reliable software systemsS. A. Frangos. 467-474
- Configuration management - a basis of the high assurance software engineering processThomas Gast, Klaus Keus. 477-479
- Multi-purpose security module based on smart cardsE. Delacour. 480-481
- An authentication service supporting domain-based access control policiesNicholas Yialelis, Morris Sloman. 482-484
- On security modelsClaudia Eckert. 485-486
- Risks on the way to the global information societySimone Fischer-Hübner, Kathrin Schier. 487-488
- Crypto Manager: an object oriented software library for cryptographic mechanismsThilo Baldin, Gerrit Bleumer. 489-491
- Cryptographic key distribution and authentication protocols for secure group communicationAndrew Hutchison, Kurt Bauknecht. 492-493
- A new hybrid encryption scheme for computer networksMahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan. 494-495
- From zero-knowledge to a practical authentication protocolVáclav Matyás Jr.. 496-497