Catálogo de publicaciones - libros
Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings
Aditya Bagchi ; Vijayalakshmi Atluri (eds.)
En conferencia: 2º International Conference on Information Systems Security (ICISS) . Kolkata, India . December 19, 2006 - December 21, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Data Encryption; Computer Communication Networks; Systems and Data Security; Computers and Society; Management of Computing and Information Systems; Information Storage and Retrieval
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-68962-1
ISBN electrónico
978-3-540-68963-8
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Cobertura temática
Tabla de contenidos
doi: 10.1007/11961635_31
Towards a Formal Specification Method for Enterprise Information System Security
Anirban Sengupta; Mridul Sankar Barik
As information infrastructure is becoming more and more complex, and connected, the security properties like confidentiality, integrity and availability are becoming more and more difficult to protect. The international community is adopting security standards such as ISO 17799 for best practices in security management and Common Criteria for security certification of IT products. It has been recognized that the security of enterprises has to be tackled from the point of view of a management structure than from a purely technological angle, and to achieve this, the primary need is to have a comprehensive security policy. A security model is a formal way of capturing such security policies. Most existing security models cannot support a wide range of security policies. The need is to develop a formal security model that combines the intricacies of the entire gamut of existing security models and supports security policies for a wide range of enterprises.
- Short Papers and Research Reports | Pp. 373-376
doi: 10.1007/11961635_32
Recent Research on Privacy Preserving Data Mining
Alex Gurevich; Ehud Gudes
We review our recent work on privacy preserving data mining and present a new algorithm for association rules mining in vertically partitioned databases that doesnt use perturbation or secure computation.
- Short Papers and Research Reports | Pp. 377-380