Information Security — the Next Decade

Proceedings of the IFIP TC11 eleventh international conference on information security, IFIP/Sec ’95

  • Jan H. P. Eloff
  • Sebastiaan H. von Solms

Table of contents

  1. Front Matter
    Pages i-viii
  2. Security Should Pay: It Should not Cost

    1. William Hugh Murray
      Pages 1-7
  3. Information Security and Business Applications 1

    1. Front Matter
      Pages 9-9
    2. G. Pangalos, D. Gritzalis, M. Khair, L. Bozios
      Pages 11-25
    3. W. Fred de Koning
      Pages 26-38
  4. Information Security Standards

  5. Management of Information Security 1

    1. Front Matter
      Pages 77-77
    2. Dušan P. Jokanovic
      Pages 87-97
    3. Louise Yngström
      Pages 98-109
  6. Cryptography, Key Management Schemes and Mobile Computing

    1. Front Matter
      Pages 111-111
    2. G. Cartert, A. Clarkt, E. Dawsont, L. Nielsent
      Pages 113-127
    3. Patrick Horster, Markus Michels, Holger Petersen
      Pages 128-142
    4. Thomas Hardjono, Jennifer Seberry
      Pages 143-151
  7. Information Security and Groupware

    1. Front Matter
      Pages 165-165
    2. Vassilis Chrissikopoulos, Dimitrios Peppes
      Pages 167-175
    3. Vesna Hassler, Reinhard Posch
      Pages 176-189
    4. P. Sanders, S. Rhodes, A. Patel
      Pages 205-219
  8. Building Secure Applications

  9. Open Distributed Security 1

  10. Management of Information Security 2

  11. Open Distributed Security 2

  12. Information Security and Business Applications 2

    1. Front Matter
      Pages 451-451
    2. D. Gritzalis, I. Kantzavelou, S. Katsikas, A. Patel
      Pages 453-464
  13. Access Control

    1. Front Matter
      Pages 511-511
    2. Burkhard Lau
      Pages 513-533

About this book


These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented covering a wide range of subjects including current industry expectations and current research aspects. The evolutionary development of information security as a professional and research discipline was discussed along with security in open distributed systems and security in groupware.


Access Groupware Mobile Computing access control cryptography distributed systems encryption information security service-oriented computing

Editors and affiliations

  • Jan H. P. Eloff
    • 1
  • Sebastiaan H. von Solms
    • 1
  1. 1.Department of Computer ScienceRand Afrikaans UniversityJohannesburgSouth Africa

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag US 1995
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-5041-2910-7
  • Online ISBN 978-0-387-34873-5
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment