SEC 1993: Toronto, Canada
- E. Graham Dougall:
Computer Security, Proceedings of the IFIP TC11, Ninth International Conference on Information Security, IFIP/Sec '93, Toronto, Canada, 12-14 May 1993. IFIP Transactions A-37, North-Holland 1993, ISBN 0-444-81748-4 - Viiveke Fåk, Amund Hunstad:
Teaching security basics: The Importance of When and How. SEC 1993: 23-30 - Guy G. Gable, Harold Joseph Highland:
Information Security in the Small Systems Context: A Framework for Understanding. SEC 1993: 37-51 - Corey D. Schou, William V. Maconachy, James Frost:
Developing Awareness, Training and Education: A Cost Effective Tool for Maintaining System Integrity. SEC 1993: 53-63 - A. R. Smith:
The Filter Model of Information Security: A Conceptual Model for Education and Training. SEC 1993: 75-89 - Hermann Strack, Kwok-Yan Lam:
Context-Dependent Access Control in Distributed Systems. SEC 1993: 137-155 - C. J. Bosch, Jan H. P. Eloff, John M. Carroll:
International Standards and Organizational Security Needs: Bridging the Gap. SEC 1993: 171-183 - Alison Anderson, Dennis Longley, Alan B. Tickle:
The Risk Data Repository: A Novel Approach to Security Risk Modelling. SEC 1993: 185-194 - Stewart Kowalski:
Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification. SEC 1993: 207-226 - L. M. du Toit, Sebastiaan H. von Solms:
A Model for Organising Information Security Documentation. SEC 1993: 227-242 - Selwyn Russell:
Planning for the EDI of Tomorrow Using Electronic Document Authorization. SEC 1993: 243-251 - Ivan Ekebrink:
Electronic Data Interface (EDI) Security and Audit: A Practical Approach. SEC 1993: 267-275 - Dalenca Pottas, Sebastiaan H. von Solms:
Superseding Manual Generation of Access Control Specification - From Policies to Profiles. SEC 1993: 327-342 - Marshall D. Abrams, Michael V. Joyce:
Extending the ISO Access Framework for Multiple Policies. SEC 1993: 343-358 - Juhani Saari:
Legal Response to a Computer Crime - Retrospect of a "Mere Chance" Case. SEC 1993: 369-373 - Philip M. Stanley:
Information Systems Security and Fraud Prevention in Office Automation Systems. SEC 1993: 375-383 - Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll:
A Process Approach to Information Security Management. SEC 1993: 385-399 - Mahdi Abdelguerfi, Andrea Dunham, Wayne Patterson:
MRA: A Computational Technique for Security in High-Performance Systems. SEC 1993: 401-417