![]()  | 
		
			 Welcome to Loot.co.za!  
				Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
			 | 
		
 Your cart is empty  | 
	||
                
                
                Showing 1 - 4 of 4 matches in All Departments
 This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D. 
 This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D. 
 This book is the thirteenth in a series presenting research papers arising from MSc/MRes research projects undertaken by students of the School of Computing and Mathematics at Plymouth University. The publications in this volume are based upon research projects that were undertaken during the 2014/15 academic year. A total of 17 papers are presented, covering many aspects of modern networking and communication technology, including security, mobility, coding schemes and quality measurement. The expanded topic coverage compared to earlier volumes in this series reflects the broadening of our range of MSc programmes. Specifically contributing programmes are: Communications Engineering and Signal Processing, Computer and Information Security, Electrical and Electronic Engineering, Network Systems Engineering, and Robotics. 
 This book is the twelfth in a series presenting research papers arising from MSc/MRes research projects undertaken by students of the School of Computing and Mathematics at Plymouth University. The publications in this volume are based upon research projects that were undertaken during the 2013/14 academic year. A total of 17 papers are presented, covering many aspects of modern networking and communication technology, including security, mobility, coding schemes and quality measurement. The expanded topic coverage compared to earlier volumes in this series reflects the broadening of our range of MSc programmes. Specifically contributing programmes are: Communications Engineering and Signal Processing, Computer and Information Security, Computer Science, Computing, Electrical and Electronic Engineering, Network Systems Engineering, and Robotics. 
  | 
            
                
	 
 
You may like...
	
	
	
		
			
				The Vulnerary of Christ - The Mysterious…
			
			
		
	
	 
	
		
			Louis Charbonneau-Lassay
		
		Hardcover
		
		
			
				
				
				
				
				
				R1,177
				
				Discovery Miles 11 770
			
			
		
	 
	
	
	
	
		
			
			
				Handbook of Alternative Data in Finance…
			
		
	
	 
	
	
		
			Gautam Mitra, Christina Erlwein-Sayer, …
		
		Hardcover
		
		
			
				
				
				
				
				
				R4,526
				
				Discovery Miles 45 260
			
			
		
	 
	
	
	
	
		
			
			
				In the United States Circuit Court of…
			
		
	
	 
	
		
			United States Circuit Court of Appeals
		
		Paperback
		
		
			
				
				
				
				
				
				R770
				
				Discovery Miles 7 700
			
			
		
	 
	
	
	
	
		
			
				The Second Funeral of Napoleon - in…
			
			
		
	
	 
	
		
			William Makepeace Thackeray
		
		Paperback
		
		
			
				
				
				
				
				
				R416
				
				Discovery Miles 4 160
			
			
		
	 
	
  |