|
|
Showing 1 - 8 of
8 matches in All Departments
The 7th Annual Working Conference of ISMSSS (lnformation Security
Management and Small Systems Security), jointly presented by WG
11.1 and WG 11.2 of the International Federation for Information
Processing {IFIP), focuses on various state-of-art concepts in the
two relevant fields. The conference focuses on technical,
functional as well as managerial issues. This working conference
brings together researchers and practitioners of different
disciplines, organisations, and countries, to discuss the latest
developments in (amongst others) secure techniques for smart card
technology, information security management issues, risk analysis,
intranets, electronic commerce protocols, certification and
accreditation and biometrics authentication. W e are fortunate to
have attracted at least six highly acclaimed international speakers
to present invited lectures, which will set the platform for the
reviewed papers. Invited speakers will talk on a broad spectrum of
issues, all related to information security management and small
system security issues. These talks cover new perspectives on
secure smart card systems, the role of BS7799 in certification,
electronic commerce and smart cards, iris biometrics and many more.
AH papers presented at this conference were reviewed by a minimum
of two international reviewers. W e wish to express our gratitude
to all authors of papers and the international referee board. W e
would also like to express our appreciation to the organising
committee, chaired by Leon Strous, for aU their inputs and
arrangements.
These are the proceedings of the Eleventh International Information
Security Conference which was held in Cape Town, South Africa, May
1995. This conference addressed the information security
requirements of the next decade and papers were presented covering
a wide range of subjects including current industry expectations
and current research aspects. The evolutionary development of
information security as a professional and research discipline was
discussed along with security in open distributed systems and
security in groupware.
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress
(WCC2000), is being held in Beijing, China from August 21 to 25,
2000. SEC2000 is the annual conference of TCll (Information
Security) of the International Federation of Information
Processing. The conference focuses on the seamless integration of
information security services as an integral part of the Global
Information Infrastructure in the new millenniUm. SEC2000 is
sponsored by the China Computer Federation (CCF), IFIP/TCll, and
Engineering Research Centre for Information Security Technology,
Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers
submitted for inclusion, 50 papers among them have been accepted as
long papers and included in this proceeding, 81 papers have been
accepted as short papers and published in another proceeding. All
papers presented in this conference were reviewed blindly by a
minimum of two international reviewers. The authors' affiliations
of the 180 submissions and the accepted 131 papers range over 26
and 25 countries or regions, respectively. We would like to
appreciate all who have submitted papers to IFIP/SEC2000, and the
authors of accepted papers for their on-time preparation of
camera-ready fmal versions. Without their contribution there would
be no conference. We wish to express our gratitude to all program
committee members and other reviewers for their hard work in
reviewing the papers in a short time and for contributing to the
conference in different ways. We would like to thank Rein Venter
for his time and expertise in compiling the fmal version of the
proceedings.
The Eighth Annual Working Conference of Information Security
Management and Small Systems Security, jointly presented by WG11.1
and WG11.2 of the International Federation for Information
Processing (IFIP), focuses on various state-of-art concepts in the
two relevant fields. The conference focuses on technical,
functional as well as managerial issues. This working conference
brings together researchers and practitioners of different
disciplines, organisations, and countries, to discuss the latest
developments in (amongst others) information security methods,
methodologies and techniques, information security management
issues, risk analysis, managing information security within
electronic commerce, computer crime and intrusion detection. We are
fortunate to have attracted two highly acclaimed international
speakers to present invited lectures, which will set the platform
for the reviewed papers. Invited speakers will talk on a broad
spectrum of issues, all related to information security management
and small system security issues. These talks cover new
perspectives on electronic commerce, security strategies,
documentation and many more. All papers presented at this
conference were reviewed by a minimum of two international
reviewers. We wish to express our gratitude to all authors of
papers and the international referee board. We would also like to
express our appreciation to the organising committee, chaired by
Gurpreet Dhillon, for all their inputs and arrangements. Finally,
we would like to thank Les Labuschagne and Hein Venter for their
contributions in compiling this proceeding for WG11.1 and WG 11.2.
This book reviews existing operational software failure analysis
techniques and proposes near-miss analysis as a novel, and new
technique for investigating and preventing software failures. The
authors provide details on how near-miss analysis techniques focus
on the time-window before the software failure actually unfolds, so
as to detect the high-risk conditions that can lead to a major
failure. They detail how by alerting system users of an upcoming
software failure, the detection of near misses provides an
opportunity to collect at runtime failure-related data that is
complete and relevant. They present a near-miss management systems
(NMS) for detecting upcoming software failures, which can
contribute significantly to the improvement of the accuracy of the
software failure analysis. A prototype of the NMS is implemented
and is discussed in the book. The authors give a practical hands-on
approach towards doing software failure investigations by means of
near-miss analysis that is of use to industry and academia
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress
(WCC2000), is being held in Beijing, China from August 21 to 25,
2000. SEC2000 is the annual conference of TCll (Information
Security) of the International Federation of Information
Processing. The conference focuses on the seamless integration of
information security services as an integral part of the Global
Information Infrastructure in the new millenniUm. SEC2000 is
sponsored by the China Computer Federation (CCF), IFIP/TCll, and
Engineering Research Centre for Information Security Technology,
Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers
submitted for inclusion, 50 papers among them have been accepted as
long papers and included in this proceeding, 81 papers have been
accepted as short papers and published in another proceeding. All
papers presented in this conference were reviewed blindly by a
minimum of two international reviewers. The authors' affiliations
of the 180 submissions and the accepted 131 papers range over 26
and 25 countries or regions, respectively. We would like to
appreciate all who have submitted papers to IFIP/SEC2000, and the
authors of accepted papers for their on-time preparation of
camera-ready fmal versions. Without their contribution there would
be no conference. We wish to express our gratitude to all program
committee members and other reviewers for their hard work in
reviewing the papers in a short time and for contributing to the
conference in different ways. We would like to thank Rein Venter
for his time and expertise in compiling the fmal version of the
proceedings.
The Eighth Annual Working Conference of Information Security
Management and Small Systems Security, jointly presented by WG11.1
and WG11.2 of the International Federation for Information
Processing (IFIP), focuses on various state-of-art concepts in the
two relevant fields. The conference focuses on technical,
functional as well as managerial issues. This working conference
brings together researchers and practitioners of different
disciplines, organisations, and countries, to discuss the latest
developments in (amongst others) information security methods,
methodologies and techniques, information security management
issues, risk analysis, managing information security within
electronic commerce, computer crime and intrusion detection. We are
fortunate to have attracted two highly acclaimed international
speakers to present invited lectures, which will set the platform
for the reviewed papers. Invited speakers will talk on a broad
spectrum of issues, all related to information security management
and small system security issues. These talks cover new
perspectives on electronic commerce, security strategies,
documentation and many more. All papers presented at this
conference were reviewed by a minimum of two international
reviewers. We wish to express our gratitude to all authors of
papers and the international referee board. We would also like to
express our appreciation to the organising committee, chaired by
Gurpreet Dhillon, for all their inputs and arrangements. Finally,
we would like to thank Les Labuschagne and Hein Venter for their
contributions in compiling this proceeding for WG11.1 and WG 11.2.
The 7th Annual Working Conference of ISMSSS (lnformation Security
Management and Small Systems Security), jointly presented by WG
11.1 and WG 11.2 of the International Federation for Information
Processing {IFIP), focuses on various state-of-art concepts in the
two relevant fields. The conference focuses on technical,
functional as well as managerial issues. This working conference
brings together researchers and practitioners of different
disciplines, organisations, and countries, to discuss the latest
developments in (amongst others) secure techniques for smart card
technology, information security management issues, risk analysis,
intranets, electronic commerce protocols, certification and
accreditation and biometrics authentication. W e are fortunate to
have attracted at least six highly acclaimed international speakers
to present invited lectures, which will set the platform for the
reviewed papers. Invited speakers will talk on a broad spectrum of
issues, all related to information security management and small
system security issues. These talks cover new perspectives on
secure smart card systems, the role of BS7799 in certification,
electronic commerce and smart cards, iris biometrics and many more.
AH papers presented at this conference were reviewed by a minimum
of two international reviewers. W e wish to express our gratitude
to all authors of papers and the international referee board. W e
would also like to express our appreciation to the organising
committee, chaired by Leon Strous, for aU their inputs and
arrangements.
|
|