Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: IFIP TC11 International Conference on Information Security Kairo (VerfasserIn)
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Boston Kluwer Acad. Publ. 2002
Schriftenreihe:International Federation for Information Processing 86
Schlagworte:
Online-Zugang:Table of contents
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV014411409
003 DE-604
005 20030303
007 t|
008 020603s2002 xxua||| |||| 10||| eng d
010 |a 2002023690 
020 |a 1402070306  |9 1-4020-7030-6 
035 |a (OCoLC)49285534 
035 |a (DE-599)BVBBV014411409 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
044 |a xxu  |c US 
050 0 |a QA76.9.A25 
082 0 |a 005.8  |2 21 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
111 2 |a IFIP TC11 International Conference on Information Security  |n 17  |d 2002  |c Kairo  |j Verfasser  |0 (DE-588)16138941-7  |4 aut 
245 1 0 |a Security in the information society  |b visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt  |c ed. by M. Adeeb Ghonaimy ... 
264 1 |a Boston  |b Kluwer Acad. Publ.  |c 2002 
300 |a XII, 586 S.  |b Ill. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a International Federation for Information Processing  |v 86 
500 |a Includes bibliographical references and index 
650 4 |a Protection de l'information (Informatique) - Coopération internationale - Congrès 
650 4 |a Sécurité informatique - Coopération internationale - Congrès 
650 4 |a Computer security  |x International cooperation  |v Congresses 
650 4 |a Data protection  |x International cooperation  |v Congresses 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Informationsgesellschaft  |0 (DE-588)4114011-4  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2002  |z Kairo  |2 gnd-content 
689 0 0 |a Informationsgesellschaft  |0 (DE-588)4114011-4  |D s 
689 0 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 |5 DE-604 
700 1 |a Ghonaimy, M. A. R.  |e Sonstige  |4 oth 
830 0 |a International Federation for Information Processing  |v 86  |w (DE-604)BV012919129  |9 86 
856 4 |u http://www.loc.gov/catdir/toc/fy031/2002023690.html  |3 Table of contents 
856 4 2 |m GBV Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009856475&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-009856475 

Datensatz im Suchindex

_version_ 1819664749139329024
adam_text SECURITY IN THE INFORMATION SOCIETY VISIONS AND PERSPECTIVES IFIP TC11 17 TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY (SEC2002) MAY 7-9, 2002, CAIRO, EGYPT EDITED BY M. ADEEB GHONAIMY AIN SHAMS UNIVERSITY EGYPT MAHMOUD T. EL-HADIDI CAIRO UNIVERSITY EGYPT HEBA K. ASIAN ELECTRONIC RESEARCH INSTITUTE EGYPT . , * , , *. * * * * , * . . - , - . A PUBLISHERS CONTENTS PREFACE IX IFIP/SEC2002 CONFERENCE COMMITTEES XI PART ONE INFORMATION SECURITY MANAGEMENT 1. THE EFFECTIVE IMPLEMENTATION OF INFORMATION SECURITY IN ORGANIZATIONS O.A. HOPPE.J. VANNIEKERK, ANDR. VON SOLMS. 1 2. A PRACTICAL APPROACH TO INFORMATION SECURITY AWARENESS IN THE ORGANIZATION C. VROOM, ANDR. VON SOLMS 19 3. RBAC POLICIES IN XML FOR X.509 BASED PRIVILEGE MANAGEMENT D.W. CHADWICK, AND A. OTENKO 3 9 4. A TOP-DOWN APPROACH TOWARDS TRANSLATING ORGANIZATIONAL SECURITY POLICY DIRECTIVES TO SYSTEM AUDIT CONFIGURATION A. AHMAD, AND T. RUIGHAVER 55 5. ELABORATING QUANTITATIVE APPROACHES FOR IT SECURITY EVALUATION D. GRITZALIS, M. KARYDA,.ANDL.GYMNOPOULOS. 67 PART TWO STANDARDS OF INFORMATION SECURITY 6. A SECURITY EVALUATION CRITERIA FOR BASELINE SECURITY STANDARDS W.J. BROOKS, M. WARREN, AND W. HUTCHINSON. 79 7. MATURITY CRITERIA FOR DEVELOPING SECURE IS AND SW: LIMITS, AND PROSPECTS M.T.SIPONEN 91 8. FOR A SECURE MOBILE IP AND MOBILE IPV6 DEPLOYMENT M. LAURENT-MAKNAVICIUS 109 PART THREE THREATS AND ATTACKS TO INFORMATION 9. ADDRESSING INTERNET SECURITY VULNERABILITIES: A BENCHMARKING STUDY A. ALAYED, S.M. FURNELL ANDI.M. BARLOW 121 10. THE THREAT FROM WITHIN - AN ANALYSIS OF ATTACKS ON AN INTERNAL NETWORK J. HAGGERTY, Q. SHI, AND M. MERABTI 133 VI CONTENTS 11. SECURITY VULNERABILITIES IN EVENT-DRIVEN SYSTEMS S. XENITELLIS 147 12. DENIAL OF SERVICE: ANOTHER EXAMPLE J.J. YAN 16 1 13. A DETECTION SCHEME FOR THE SK VIRUS D. SALAH, H.K. ASLAN, ANDM.T. EL-HADIDI 171 PART FOUR EDUCATION AND CURRICULUM FOR INFORMATION SECURITY 14. AN INFORMATION SECURITY CURRICULUM IN FINLAND T. VIRTANEN, AND R. ADDAMS-MORING 183 PART FIVE SOCIAL AND ETHICAL ASPECTS OF INFORMATION SECURITY 15. INFORMATION SECURITY CULTURE: THE SOCIO-CULTURAL DIMENSION IN INFORMATION SECURITY MANAGEMENT T. SCHLIENGER, AND S. TEUFEL 191 16. INFORMATION SECURITY CULTURE A. MARTINS, ANDJ. ELOFF 203 PART SIX INFORMATION SECURITY SERVICES 17. KEYSTROKE ANALYSIS AS A METHOD OF ADVANCED USER AUTHENTICATION AND RESPONSE P.S. DOWLAND, S.M. FURNELL, ANDM. PAPADAKI. 215 18. ZERO KNOWLEDGE BROADCASTING IDENTIFICATION SCHEME M.S. EL-SOUDANI, H.S. EL-REFAEY, ANDH.M. MOURAD 227 19. A NEW END-TO-END AUTHENTICATION PROTOCOL FOR MOBILE USERS TO ACCESS INTERNET SERVICES LI-SHA HE, N. ZHANG, LI-RONG HE 239 20. MANDATORY SECURITY POLICIES FOR CORBA SECURITY MODEL CM. WESTPHALL, J. DA S. FRAGA, C.B. WESTPHALL, AND S.C.S. BIANCHI 251 21. POLICAP-PROPOSAL, DEVELOPMENT AND EVALUATION OF A POLICY SERVICE AND CAPABILITIES FOR CORBA SECURITY CM. WESTPHALL, J. DA S FRAGA, M.S. WANGHAM, R.R. OBELHEIRO, ANDL.C. LUNG 263 22. SECURE DATABASE CONNECTIVITY ON THE WWW M. COETZEE, ANDJ. ELOFF. 275 23. TOWARDS SEMANTIC INTEGRITY IN RATIONAL DATABASE R.A. BOTHA 287 24. FORMAL DESIGN OF PACKET FILTERING SYSTEMS G. OSMAN, M.G. DARWISH, ANDM. ZAKI 299 25. ELLIPTIC CURVE CRYPTOSYSTEMS ON SMART CARDS E. MOHAMMED, A. EMARAH, ANDKH. EL-SHENNAWY 311 SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES VII PART SEVEN MULTILATERAL SECURITY 26. ESTABLISHING BILATERAL ANONYMOUS COMMUNICATION IN OPEN NETWORKS T.DEMUTH 323 PART EIGHT APPLICATIONS OF INFORMATION SECURITY 27. BRITS-A HOLISTIC FRAMEWORK FOR HEDGING SHAREHOLDER VALUE IN IT DEPENDENT BUSINESS C. MAGNUSSON, ANDL. YNGSTROM. 335 28. INFORMATION SYSTEMS SECURITY AND THE INFORMATION SYSTEMS DEVELOPMENT PROJECT: TOWARDS A FRAMEWORK FOR THEIR INTEGRATION T. TRYFONAS, AND E. KIOUNTOUZIS 347 29. AN EFFICIENT HYBRID SEALED BID AUCTION PROTOCOL R. ABDEL-MONEIM, S. EL-KASSAS, AND H. HOSNY. 357 30. SELF-DETERMINATION IN MOBILE INTERNET: PIMI PROTOTYPE RESULTS S. FISCHER-HUBNER, M. NILSSON AND H. LINDSKOG 37 3 31. SECURE COMPONENT DISTRIBUTION USING WEBCOM S.N. FOLEY, T.B. QUILLINAN, ANDJ.P. MORRISON. 387 32. E-TICKET ISSUING SYSTEM WITH 3-D PATTERN RECOGNITION FOR MOBILE TERMINALS R. UDA, M. ITO, K. AW AY A, H. SHIGENO, AND Y. MATSUSHITA 399 33. AN INSIGHT INTO USER PRIVACY AND ACCOUNTABLE ANONYMITY FOR MOBILE E-COMMERCE TRANSACTIONS D. CRITCHLOW, AND N. ZHANG 411 PART NINE INFRASTRUCTURE FOR INFORMATION SECURITY 34. SECURE SELECTIVE EXCLUSION IN AD HOC WIRELESS NETWORK R.O. DIPIETRO, L. V. MANCINI, ANDS. JAJODIA 423 PART TEN ADVANCED TOPICS IN SECURITY 35. OPTICAL NETWORK MODELS FOR QUANTUM CRYPTOGRAPHY S.T. FARAJ, F. AL-NAIMA, ANDS.Y. AMEEN 435 PART ELEVEN LEGISLATION FOR INFORMATION SECURITY 36. A UNIFIED REGULATORY FRAMEWORK ON A EUROPEAN INFORMATION SOCIETY: SUGGESTED BUILDING LEVELS P.S. ANASTASIADES 453 37. REVISITING LEGAL AND REGULATORY REQUIREMENTS FOR SECURE E-VOTING L. MITROU, D. GRITZALIS, AND S. KATSIKAS 469 VIII CONTENTS PART TWELVE MODELING AND ANALYSIS FOR INFORMATION SECURITY 38. A SECURITY INCIDENT DATA MODEL M.A.BELSIS, N. GODWIN, ANDL. SMALOV 481 39. SECURITY LEVELS FOR CONTRACTING AGENTS A. MEIER, ANDS. ROHRIG 495 40. FUNCTIONAL REQUIREMENTS FOR A SECURE ELECTRONIC VOTING SYSTEM S. IKONOMOPOULOS, C. LAMBRINOUDAKIS, D. GRITZALIS, S. KOKOLAKIS, ANDK. VASSILIOU. 507 41. INTELLIGENT IP PACKET FILTERING M. HASHEM, A. MOHAMED, ANDM. WAHIB 521 PART THIRTEEN TOOLS FOR INFORMATION SECURITY 42. HUMAN COMPUTER INTERACTION: AN INFORMATION SECURITY PERSPECTIVES MM. ELOFF, ANDJ.H.P. ELOFF 535 43. A VERY SMART CARD FOR FIGHTING AGAINST TERRORISM J.GENESTE 547 44. SHEDEL - A SIMPLE HIERARCHICAL EVENT DESCRIPTION LANGUAGE FOR SPECIFYING ATTACK SIGNATURES M. MEIER, N.BISCHOF, AND T.HOLZ 559 45. PROPAGATING MODIFICATIONS TO MOBILE POLICIES K. SMITH, D. FAATZ, A. FAYAD, AND S. JAJODIA 573 AUTHOR INDEX 585
any_adam_object 1
author_corporate IFIP TC11 International Conference on Information Security Kairo
author_corporate_role aut
author_facet IFIP TC11 International Conference on Information Security Kairo
author_sort IFIP TC11 International Conference on Information Security Kairo
building Verbundindex
bvnumber BV014411409
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
classification_rvk ST 277
ctrlnum (OCoLC)49285534
(DE-599)BVBBV014411409
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02346nam a2200493zcb4500</leader><controlfield tag="001">BV014411409</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20030303 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">020603s2002 xxua||| |||| 10||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2002023690</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1402070306</subfield><subfield code="9">1-4020-7030-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)49285534</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014411409</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">IFIP TC11 International Conference on Information Security</subfield><subfield code="n">17</subfield><subfield code="d">2002</subfield><subfield code="c">Kairo</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)16138941-7</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in the information society</subfield><subfield code="b">visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt</subfield><subfield code="c">ed. by M. Adeeb Ghonaimy ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Kluwer Acad. Publ.</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 586 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">International Federation for Information Processing</subfield><subfield code="v">86</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique) - Coopération internationale - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique - Coopération internationale - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">International cooperation</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">International cooperation</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2002</subfield><subfield code="z">Kairo</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghonaimy, M. A. R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">International Federation for Information Processing</subfield><subfield code="v">86</subfield><subfield code="w">(DE-604)BV012919129</subfield><subfield code="9">86</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/fy031/2002023690.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=009856475&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009856475</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2002 Kairo gnd-content
genre_facet Konferenzschrift 2002 Kairo
id DE-604.BV014411409
illustrated Illustrated
indexdate 2024-12-23T15:56:22Z
institution BVB
institution_GND (DE-588)16138941-7
isbn 1402070306
language English
lccn 2002023690
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-009856475
oclc_num 49285534
open_access_boolean
physical XII, 586 S. Ill.
publishDate 2002
publishDateSearch 2002
publishDateSort 2002
publisher Kluwer Acad. Publ.
record_format marc
series International Federation for Information Processing
series2 International Federation for Information Processing
spellingShingle Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt
International Federation for Information Processing
Protection de l'information (Informatique) - Coopération internationale - Congrès
Sécurité informatique - Coopération internationale - Congrès
Computer security International cooperation Congresses
Data protection International cooperation Congresses
Datensicherung (DE-588)4011144-1 gnd
Informationsgesellschaft (DE-588)4114011-4 gnd
subject_GND (DE-588)4011144-1
(DE-588)4114011-4
(DE-588)1071861417
title Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt
title_auth Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt
title_exact_search Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt
title_full Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt ed. by M. Adeeb Ghonaimy ...
title_fullStr Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt ed. by M. Adeeb Ghonaimy ...
title_full_unstemmed Security in the information society visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt ed. by M. Adeeb Ghonaimy ...
title_short Security in the information society
title_sort security in the information society visions and perspectives ifip tc11 17th international conference on information security sec2002 may 7 9 2002 cairo egypt
title_sub visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt
topic Protection de l'information (Informatique) - Coopération internationale - Congrès
Sécurité informatique - Coopération internationale - Congrès
Computer security International cooperation Congresses
Data protection International cooperation Congresses
Datensicherung (DE-588)4011144-1 gnd
Informationsgesellschaft (DE-588)4114011-4 gnd
topic_facet Protection de l'information (Informatique) - Coopération internationale - Congrès
Sécurité informatique - Coopération internationale - Congrès
Computer security International cooperation Congresses
Data protection International cooperation Congresses
Datensicherung
Informationsgesellschaft
Konferenzschrift 2002 Kairo
url http://www.loc.gov/catdir/toc/fy031/2002023690.html
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009856475&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV012919129
work_keys_str_mv AT ifiptc11internationalconferenceoninformationsecuritykairo securityintheinformationsocietyvisionsandperspectivesifiptc1117thinternationalconferenceoninformationsecuritysec2002may792002cairoegypt
AT ghonaimymar securityintheinformationsocietyvisionsandperspectivesifiptc1117thinternationalconferenceoninformationsecuritysec2002may792002cairoegypt