Information Security Management, Education and Privacy IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22–27 August 2004 Toulouse, France

This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that are currently particularly active in Security. The first one is the 10th IFIP Annual Working Conference on Information Security Management. It is organi...

Full description

Bibliographic Details
Other Authors: Deswarte, Yves (Editor), Cuppens, Frederic (Editor), Jajodia, Sushil (Editor), Wang, Lingyu (Editor)
Format: eBook
Language:English
Published: New York, NY Springer US 2004, 2004
Edition:1st ed. 2004
Series:IFIP Advances in Information and Communication Technology
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
Table of Contents:
  • Corporate Information Security Education
  • Towards Corporate Information Security Obedience
  • CIIP-RAM- A Security Risk Analysis Methodology for Critical Information Infrastructure Protection
  • A Framework for Role-Based Monitoring of Insider Misuse
  • Update/Patch Management Systems
  • Investigating a Smart Technology
  • Laboratory Support for Information Security Education
  • An Holistic Approach to an International Doctoral Program
  • A New Paradigm for Information Security Education at Doctoral Level
  • Highly Qualified Information Security Personnel Training in Russia
  • Doctor of Philosophy: It Security
  • Doctoral Programme on ICS Security at the University of the Aegean
  • An International Security Education Perspective
  • DO Military Forces Need Ph.D.’s?
  • A Doctoral Program with Specialization in Information Security
  • A Security Model for Anonymous Credential Systems
  • Private Information Storage with Logarithmic-Space Secure Hardware
  • Taxonomy of Mixes and Dummy Traffic
  • Identity Management for Self-Portrayal
  • Privacy Preserving Online Reputation Systems
  • A Risk-Driven Approach to Designing Privacy-Enhanced Secure Applications
  • Privacy-Invasive Software in Filesharing Tools
  • Infusing Privacy Norms in DRM.