Abstract is missing.
- Information security - challenges for the next millenniumAlan K. Stanley. 3-8
- Selection of secure single sign-on solutions for heterogeneous computing environmentsC. P. Louwrens, Sebastiaan H. von Solms. 9-24
- A formal model to aid documenting and harmonizing of information security requirementsJussipekka Leiwo, Yuliang Zheng. 25-38
- A compile-time model for safe information flow in object-oriented databasesMasha Gendler-Fishman, Ehud Gudes. 41-55
- Deriving Authorizations from Process Analysis in Legacy Information SystemsSilvana Castano, Maria Grazia Fugini. 56-67
- The role of government in creating the IT security infrastructure: builder or bystander?Mads Bryde Andersen. 71-77
- Code of Practice: A Standard for Information Security ManagementLam-for Kwok, Dennis Longley. 78-90
- Can security baselines replace risk analysis?Rossouw von Solms. 91-98
- gGSS-API: a group enhanced generic security serviceAndrew Hutchison. 101-110
- Electronic document exchange in Sweden - the legal aspectsPer Furberg. 113-119
- An attack detection system for secure computer systems - outline of the solutionIoanna Kantzavelou, Sokratis K. Katsikas. 123-135
- A taxonomy and overview of information security experimentsErland Jonsson, Lech J. Janczewski. 139-150
- Pseudonymous audit for privacy enhanced intrusion detectionMichael Sobirey, Simone Fischer-Hübner, Kai Rannenberg. 151-163
- Individual management of personal reachability in mobile communicationMartin Reichenbach, Herbert Damker, Hannes Federrath, Kai Rannenberg. 164-174
- New vistas on info-system securityWillis H. Ware. 177-196
- A common criteria framework for the evaluation of information technology systems securityR. Kruger, Jan H. P. Eloff. 197-209
- A methodology for accrediting a commercial distributed databaseJan H. P. Eloff, R. Körner. 210-221
- A comparison of schemes for certification authorities/trusted third partiesA. van Rensburg, Sebastiaan H. von Solms. 222-240
- How to trust systemsAudun Jøsang, F. Van Laenen, Svein J. Knapskog, Joos Vandewalle. 241-252
- Integrating information security in the development of telematics systemsO. Tettero, D.-J. Out, Henry M. Franken, J. Schot. 255-266
- Developing secure applications: a systematic approachClaudia Eckert, D. Marek. 267-279
- Controlling Internet access at an educational institutionW. Olivier, Helen van de Haar. 280-292
- Analysis of Java security and hostile appletsKlaus Brunnstein. 293-295
- New organizational forms for information security managementRichard Baskerville. 296-307
- Security when outsourcing: concepts, constructs, complianceEdo Roos Lindgreen, H. R. D. Janus, A. Shahim, G. Hulst, I. S. Herschberg. 308-318
- The IFIP TC11 position on cryptopolicies321-322
- Towards a holistic view of security and safety of enterprise information and communication technologies: adapting to a changing paradigmKlaus Brunnstein. 325-336
- A taxonomy of electronic cash schemesErnest Foo, Colin Boyd, William J. Caelli, Ed Dawson. 337-348
- Large scale elections by coordinating electoral collegesAndreu Riera, Joan Borrell, Josep Rifà. 349-362
- MVS-SAT: a security administration tool to support SMF protocol data evaluationClaudia Eckert, Th. Stoesslein. 363-374
- Security requirements and solutions in distributed electronic health recordsBernd Blobel. 377-390
- ODESSA - a new approach to healthcare risk analysisMatthew J. Warren, Steven Furnell, Peter W. Sanders. 391-402
- A comprehensive need-to-know access control system and its application for medical information systemsRalph Holbein, Stephanie Teufel, Othmar Morger, Kurt Bauknecht. 403-414
- The future of networks and network securityR. Nelson. 417-424
- Securing communications over ATM networksMaryline Laurent, Olivier Paul, Pierre Rolin. 425-439
- Non-intrusive authenticationDaniel Alberto Galliano, Antonio Lioy, Fabio Maino. 440-451
- Roaming security agents enabling intelligent access control and network protectionP. W. J. van Zyl, Sebastiaan H. von Solms. 452-468