IFIP TC6 Open Digital Library

Integrity and Internal Control in Information Systems 2004: Fairfax, Virginia; USA

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference [18-19 November 2004, Fairfax, Virginia; USA]

Paul Dowland, Steven Furnell, Bhavani M. Thuraisingham, Xiaoyang Sean Wang

Springer, IFIP 193, ISBN: 978-0-387-29826-9



Contents

Information Security Standards: Adoption Drivers (Invited Paper) - What drives organisations to seek accreditation? The case of BS 7799-2: 2002.

Jean-Noël Ezingeard, David William Birchall

 1-20

Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper).

Gurvirender Tejay, Gurpreet Dhillon, Amita Goyal Chin

 21-39

From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper).

Csilla Farkas, Vaibhav Gowadia, Amit Jain, D. Roy

 41-55

How Much Should We Pay for Security? (Invited Paper).

Sokratis K. Katsikas, Athanassios N. Yannacopoulos, Stefanos Gritzalis, Costas Lambrinoudakis, Petros Hatzopoulos

 59-69

Do Not Ship, or Receive, Trojan Horses - Avoiding Network Vulnerabilities Potentially Introduced by Embedded Systems.

Corey Hirsch

 71-82

Employee Security Perception in Cultivating Information Security Culture.

Omar Zakaria

 83-92

A Policy Framework for Access Management in Federated Information Sharing.

Rafae Bhatti, Elisa Bertino, Arif Ghafoor

 95-120

A Hierarchical Release Control Policy Framework.

Chao Yao, William H. Winsborough, Sushil Jajodia

 121-137

Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC.

James R. Conrad, Paul W. Oman, Carol Taylor

 141-156

The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study.

Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström

 157-173

Risk Communication, Risk Perception and Information Security.

Malcolm Robert Pattinson, Grantley Anderson

 175-184

A Holistic Risk Analysis Method for Identifying Information Security Risks.

Janine L. Spears

 185-202

A Responsibility Framework for Information Security.

Shaun Posthumus, Rossouw von Solms

 205-221

Information Security Governance - A Re-Definition.

Rahul Rastogi, Rossouw von Solms

 223-236

Can We Tune Information Security Management Into Meeting Corporate Governance Needs? (Invited Paper).

Louise Yngström

 237-245

Measurement of Information Security in Processes and Products.

Reijo Savola, Juhani Anttila, Anni Sademies, Jorma Kajava, Jarkko Holappa

 249-265

A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises.

Vassilis Dimopoulos, Steven Furnell

 267-283

A UML Approach in the ISMS Implementation.

Andrzej Bialas

 285-297

Attack Aware Integrity Control in Databases (Invited Abstract).

Peng Liu

 301

Characteristics and Measures for Mobile-Masquerader Detection.

Oleksiy Mazhelis, Seppo Puuronen

 303-318

A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions.

Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner

 319-333

A Trust-Based Model for Information Integrity in Open Systems.

Yanjun Zuo, Brajendra Panda

 337-354

Scalable Access Policy Administration (Invited Paper) - Opinions and a Research Agenda.

Arnon Rosenthal

 355-370

Semantic Information Infrastructure Protection (Invited Abstract).

Paul Thompson

 371