


default search action
SEC 1992: Singapore
- Guy G. Gable, William J. Caelli:
IT Security: The Need for International Cooperation, Proceedings of the IFIP TC11, Eigth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992. IFIP Transactions A-15, North-Holland 1992, ISBN 0-444-89699-6
Keynote and Invited Papers
- Wayne Madsen:
International Information Technology (IT) Security Cooperation into the 21st Century. SEC 1992: 5-12 - Alan Reed:
Computer Disasters: The Impact on Business in the 1990's. SEC 1992: 13-21 - Teck Soon Chew:
ASEAN - Computer Crime and Corrective Action: A Status Report. SEC 1992: 23-33
Security Management 1
- John G. Beatson:
Information Security: The Impact of End User Computing. SEC 1992: 35-45 - Steen Bentzen:
PRAJORIS: A Pragmatic 'Joint' Method for Raising the Information Security Level in a Company. SEC 1992: 47-60 - Alan K. Stanley:
The Status of IT Security in Leading European Organisations. SEC 1992: 61-72 - Per L. Hoving, Mats Ohlin, Jan Rylander:
Findings of the Swedish CITI Project on Information Technology Security Evaluation and Certification. SEC 1992: 73-85
Network Security
- Paul L. Overbeek:
Secure Open Systems: An Investigation of Current Standardisation Efforts. SEC 1992: 87-100 - Weijun Wang, Tom Coffey:
Network Security: Design of a Global Secure Link. SEC 1992: 101-111 - Dalenca Pottas, Sebastiaan H. von Solms:
MAPS - Model for Automated Profile Specification. SEC 1992: 113-126
Keynote and Invited Papers
- Christopher L. J. Holloway:
Cryptography and the Art of Securing Transactions. SEC 1992: 127-137 - Donn B. Parker:
Restating the Foundation of Information Security. SEC 1992: 139-151
Security Management 2
- Lech J. Janczewski:
Data Security Model for Branch Offices of Big Organisations. SEC 1992: 153-164 - David L. H. Bachelor, Peter P. C. H. Kingston:
Practical Security for the Small Computer User. SEC 1992: 165-178 - Kevin McLean:
Information Security Awareness - Selling the Cause. SEC 1992: 179-193 - Peter Capiteijns:
A Company's Battle Against the Virus Plague. SEC 1992: 195-204
IS Audit
- Dieter Fink:
How Expert are Auditors in the Computer Security Field? South African Findings and Interpretations. SEC 1992: 205-219 - Charlie Soh, Guy G. Gable:
IS Audit Research: A Paradigm and A Framework. SEC 1992: 221-234
Cryptography
- Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli:
Measuring the Strength of Ciphers. SEC 1992: 235-247 - Patrick Horster, Hans-Joachim Knobloch:
Cryptographic Protocols and Network Security. SEC 1992: 249-263 - Chin-Chen Chang, Horng-Chin Lee:
A Solution to Generalized Group Oriented Cryptography. SEC 1992: 265-275 - William J. Caelli, Dennis Longley, Alan B. Tickle:
A Methodology for Describing Information and Physical Security Architectures. SEC 1992: 277-296
Computer Crime 1
- Philip M. Stanley:
A Methodology for the Investigation of Computer Crime. SEC 1992: 297-308 - Detmar W. Straub, Patricia J. Carlson, Elizabeth H. Jones:
Detering Highly Motivated Computer Abusers: A Field Experiment in Computer Security. SEC 1992: 309-324
Keynote and Invited Papers
- F. Bertil Fortrie:
IT Crime - An Intelligence Report. SEC 1992: 325-334 - James L. Clark:
UNIX Operating System Security. SEC 1992: 335-343
Database Security
- Martin S. Olivier, Sebastiaan H. von Solms:
DISCO - A Discretionary Security Model for Object-oriented Databases. SEC 1992: 345-357 - Vinti Doshi, Sushil Jajodia:
Referential Integrity in Multilevel Secure Database Management Systems. SEC 1992: 359-371 - Yeow Meng Chee, Andrew Lim:
A Complex Approach to the Security of Statistical Databases Subject to Off-line Sum Queries. SEC 1992: 373-384
UNIX Security
- Craig Rubin:
The New Security Paradigm in the Enterprise Computing Environment. SEC 1992: 385-394 - Kevin H. Brady:
Integrating B2 Security into a UNIX System. SEC 1992: 395-408
Access Control/Detection
- Marshall D. Abrams, Ingrid M. Olson:
Rule-based Trusted Access Control. SEC 1992: 409-420 - Chien Siang Yu:
Covernmentware: A New Vehicle to Boost Computer Security on a National Level. SEC 1992: 421-432 - Don Holden:
A Rule-based Intrusion Detection System. SEC 1992: 433-440 - Burkhard Lau:
Access Control - A Further Approach. SEC 1992: 441-462
Computer Crime 2
- Bengt Angerfelt:
Computer Crimes: A Study of Different Types of Offences and Offenders. SEC 1992: 463-474 - Michael R. Jones:
Dealing with Computer Misuse - The Need for an International Approach. SEC 1992: 475-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.