Catálogo de publicaciones - libros

Compartir en
redes sociales


Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings

Aditya Bagchi ; Vijayalakshmi Atluri (eds.)

En conferencia: 2º International Conference on Information Systems Security (ICISS) . Kolkata, India . December 19, 2006 - December 21, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Computer Communication Networks; Systems and Data Security; Computers and Society; Management of Computing and Information Systems; Information Storage and Retrieval

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-68962-1

ISBN electrónico

978-3-540-68963-8

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Towards a Formal Specification Method for Enterprise Information System Security

Anirban Sengupta; Mridul Sankar Barik

As information infrastructure is becoming more and more complex, and connected, the security properties like confidentiality, integrity and availability are becoming more and more difficult to protect. The international community is adopting security standards such as ISO 17799 for best practices in security management and Common Criteria for security certification of IT products. It has been recognized that the security of enterprises has to be tackled from the point of view of a management structure than from a purely technological angle, and to achieve this, the primary need is to have a comprehensive security policy. A security model is a formal way of capturing such security policies. Most existing security models cannot support a wide range of security policies. The need is to develop a formal security model that combines the intricacies of the entire gamut of existing security models and supports security policies for a wide range of enterprises.

- Short Papers and Research Reports | Pp. 373-376

Recent Research on Privacy Preserving Data Mining

Alex Gurevich; Ehud Gudes

We review our recent work on privacy preserving data mining and present a new algorithm for association rules mining in vertically partitioned databases that doesnt use perturbation or secure computation.

- Short Papers and Research Reports | Pp. 377-380