IFIP TC6 Open Digital Library

Integrity and Internal Control in Information Systems 2004: Fairfax, Virginia; USA

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference [18-19 November 2004, Fairfax, Virginia; USA]

Paul Dowland, Steven Furnell, Bhavani M. Thuraisingham, Xiaoyang Sean Wang

Springer, IFIP 193, ISBN: 978-0-387-29826-9


Information Security Standards: Adoption Drivers (Invited Paper) - What drives organisations to seek accreditation? The case of BS 7799-2: 2002.

Jean-Noël Ezingeard, David William Birchall


Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper).

Gurvirender Tejay, Gurpreet Dhillon, Amita Goyal Chin


From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper).

Csilla Farkas, Vaibhav Gowadia, Amit Jain, D. Roy


How Much Should We Pay for Security? (Invited Paper).

Sokratis K. Katsikas, Athanassios N. Yannacopoulos, Stefanos Gritzalis, Costas Lambrinoudakis, Petros Hatzopoulos


Do Not Ship, or Receive, Trojan Horses - Avoiding Network Vulnerabilities Potentially Introduced by Embedded Systems.

Corey Hirsch


Employee Security Perception in Cultivating Information Security Culture.

Omar Zakaria


A Policy Framework for Access Management in Federated Information Sharing.

Rafae Bhatti, Elisa Bertino, Arif Ghafoor


A Hierarchical Release Control Policy Framework.

Chao Yao, William H. Winsborough, Sushil Jajodia


Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC.

James R. Conrad, Paul W. Oman, Carol Taylor


The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study.

Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström


Risk Communication, Risk Perception and Information Security.

Malcolm Robert Pattinson, Grantley Anderson


A Holistic Risk Analysis Method for Identifying Information Security Risks.

Janine L. Spears


A Responsibility Framework for Information Security.

Shaun Posthumus, Rossouw von Solms


Information Security Governance - A Re-Definition.

Rahul Rastogi, Rossouw von Solms


Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper).

Louise Yngström


Measurement of Information Security in Processes and Products.

Reijo Savola, Juhani Anttila, Anni Sademies, Jorma Kajava, Jarkko Holappa


A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises.

Vassilis Dimopoulos, Steven Furnell


A UML Approach in the ISMS Implementation.

Andrzej Bialas


Attack Aware Integrity Control in Databases (Invited Abstract).

Peng Liu


Characteristics and Measures for Mobile-Masquerader Detection.

Oleksiy Mazhelis, Seppo Puuronen


A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions.

Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner


A Trust-Based Model for Information Integrity in Open Systems.

Yanjun Zuo, Brajendra Panda


Scalable Access Policy Administration (Invited Paper) - Opinions and a Research Agenda.

Arnon Rosenthal


Semantic Information Infrastructure Protection (Invited Abstract).

Paul Thompson