


default search action
SEC 1992: Singapore
- Guy G. Gable, William J. Caelli:

IT Security: The Need for International Cooperation, Proceedings of the IFIP TC11, Eigth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992. IFIP Transactions A-15, North-Holland 1992, ISBN 0-444-89699-6
Keynote and Invited Papers
- Wayne Madsen:

International Information Technology (IT) Security Cooperation into the 21st Century. SEC 1992: 5-12 - Alan Reed:

Computer Disasters: The Impact on Business in the 1990's. SEC 1992: 13-21 - Teck Soon Chew:

ASEAN - Computer Crime and Corrective Action: A Status Report. SEC 1992: 23-33
Security Management 1
- John G. Beatson:

Information Security: The Impact of End User Computing. SEC 1992: 35-45 - Steen Bentzen:

PRAJORIS: A Pragmatic 'Joint' Method for Raising the Information Security Level in a Company. SEC 1992: 47-60 - Alan K. Stanley:

The Status of IT Security in Leading European Organisations. SEC 1992: 61-72 - Per L. Hoving, Mats Ohlin, Jan Rylander:

Findings of the Swedish CITI Project on Information Technology Security Evaluation and Certification. SEC 1992: 73-85
Network Security
- Paul L. Overbeek:

Secure Open Systems: An Investigation of Current Standardisation Efforts. SEC 1992: 87-100 - Weijun Wang, Tom Coffey:

Network Security: Design of a Global Secure Link. SEC 1992: 101-111 - Dalenca Pottas, Sebastiaan H. von Solms:

MAPS - Model for Automated Profile Specification. SEC 1992: 113-126
Keynote and Invited Papers
- Christopher L. J. Holloway:

Cryptography and the Art of Securing Transactions. SEC 1992: 127-137 - Donn B. Parker:

Restating the Foundation of Information Security. SEC 1992: 139-151
Security Management 2
- Lech J. Janczewski:

Data Security Model for Branch Offices of Big Organisations. SEC 1992: 153-164 - David L. H. Bachelor, Peter P. C. H. Kingston:

Practical Security for the Small Computer User. SEC 1992: 165-178 - Kevin McLean:

Information Security Awareness - Selling the Cause. SEC 1992: 179-193 - Peter Capiteijns:

A Company's Battle Against the Virus Plague. SEC 1992: 195-204
IS Audit
- Dieter Fink:

How Expert are Auditors in the Computer Security Field? South African Findings and Interpretations. SEC 1992: 205-219 - Charlie Soh, Guy G. Gable:

IS Audit Research: A Paradigm and A Framework. SEC 1992: 221-234
Cryptography
- Helen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli:

Measuring the Strength of Ciphers. SEC 1992: 235-247 - Patrick Horster, Hans-Joachim Knobloch:

Cryptographic Protocols and Network Security. SEC 1992: 249-263 - Chin-Chen Chang, Horng-Chin Lee:

A Solution to Generalized Group Oriented Cryptography. SEC 1992: 265-275 - William J. Caelli, Dennis Longley, Alan B. Tickle:

A Methodology for Describing Information and Physical Security Architectures. SEC 1992: 277-296
Computer Crime 1
- Philip M. Stanley:

A Methodology for the Investigation of Computer Crime. SEC 1992: 297-308 - Detmar W. Straub, Patricia J. Carlson, Elizabeth H. Jones:

Detering Highly Motivated Computer Abusers: A Field Experiment in Computer Security. SEC 1992: 309-324
Keynote and Invited Papers
- F. Bertil Fortrie:

IT Crime - An Intelligence Report. SEC 1992: 325-334 - James L. Clark:

UNIX Operating System Security. SEC 1992: 335-343
Database Security
- Martin S. Olivier, Sebastiaan H. von Solms:

DISCO - A Discretionary Security Model for Object-oriented Databases. SEC 1992: 345-357 - Vinti Doshi, Sushil Jajodia:

Referential Integrity in Multilevel Secure Database Management Systems. SEC 1992: 359-371 - Yeow Meng Chee, Andrew Lim:

A Complex Approach to the Security of Statistical Databases Subject to Off-line Sum Queries. SEC 1992: 373-384
UNIX Security
- Craig Rubin:

The New Security Paradigm in the Enterprise Computing Environment. SEC 1992: 385-394 - Kevin H. Brady:

Integrating B2 Security into a UNIX System. SEC 1992: 395-408
Access Control/Detection
- Marshall D. Abrams, Ingrid M. Olson:

Rule-based Trusted Access Control. SEC 1992: 409-420 - Chien Siang Yu:

Covernmentware: A New Vehicle to Boost Computer Security on a National Level. SEC 1992: 421-432 - Don Holden:

A Rule-based Intrusion Detection System. SEC 1992: 433-440 - Burkhard Lau:

Access Control - A Further Approach. SEC 1992: 441-462
Computer Crime 2
- Bengt Angerfelt:

Computer Crimes: A Study of Different Types of Offences and Offenders. SEC 1992: 463-474 - Michael R. Jones:

Dealing with Computer Misuse - The Need for an International Approach. SEC 1992: 475-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














