IFIP TC11 Information Security & Privacy Conference (SEC)

Past conferences

SEC conferences are the flagship events of the International Federation for Information Processing (IFIP) Technical Committee 11 (TC11) on Information Security and Privacy Protection in Information Processing Systems. Proceedings from this conference series can be found through our publisher Springer under the International Conference on ICT Systems Security and Privacy Protection series.

Please reach out if you have any information in relation to our historic events to help complete our records.

View our past conference series:
2025+ (40th+) | 2015-2024 (30th-39th) | 2005-2014 (20th-29th) | 1994-2004 (10th-19th) | 1983-1993 (1st-9th)

1994 - links to papers (where available)

10th Conference, Curaçao, Dutch Carribbean, 23-27 May 1994

Proceedings

    51 papers
    The proceedings for the 1994 conference were scheduled to be published through North-Holland (later Elsevier) but never completed. Below is a list of papers taken from the 'delegate handout' - we are currently seeking permission from authors to include links to the PDF copies of each paper. If you are one of the authors below, please contact us as we need your approval before linking the papers for public access.
    A few papers were archived online via the old TC11 website.

    The following papers appear in the order as presented in the handout.
    Nikolai Bezroukov
    Computer Crime in the Ukraine
    William J. Caelli & John M. Carroll
    A Comparison of International Information Security Standards Based on Documentary Micro-Analysis
    Wayne Madsen
    Privacy Aspects of Data Travelling Along the New Highway
    Philip Zimmermann
    The Politics of Pretty Good Privacy
    N. Balasubramanian
    Computer Based Cryptanalysis: Man vs Machine Approach
    Thomas Beth & Dieter Gollmann
    Security Systems Based on Exponentiation Primitives
    Sead Muftic, Nada Kapidzic & Alan Davidson
    The Structure and Functioning of the Cost Privacy Enhanced Mail (PEM) System
    Mahmoud T. El-Hadidi
    Secure Communication in LANs Using a Hybrid Encryption Scheme
    Burkhard Lau & Waltraud Gerhardt
    A Decentralized Approach for Authorization
    Wolfgang Mayerwieser & Reinhard Posch
    Prohibiting the Exchange Attack Calls for Hardware Signature
    Ir. Paul L. Overbeek
    Towards Secure Open Systems
    H. Schoone
    Security Evaluation Criteria - Position Paper
    Ralph Hauser & Stefano Zatti
    Security, Authentication and Policy Management in Open Distributed Systems
    Sharon Fletcher
    The Risk-Based Information System Design Paradigm
    Peter Fillery & A.N. Chantler
    Is Lack of Serious Acceptance and Application of Software Quality Assurance Principles a Password to Information Security Problems?
    Jean Hitchings
    The Need for A New Approach To Information Security
    Jingsha He
    Program Structure for Secure Information Flow
    Paul Spirakis, Sokratis Katsikas, Dimitris Gritzalis, Francois Allegre, Dimitris Androutsopoulos, John Darzentas, Claude Gigante, Dimitris Karagiannis, Heiki Putkonen & Thomas Spyrou
    SECURENET: A Network-Oriented Intelligent Intrusion Prevention and Detection System
    Elaine Palmer
    An Introduction to Citadel: A Secure Crypto Co-Processor for Workstations
    Stefan Santesson
    An Open Architecture for Security Functions In Workstations
    Barry Barber, Paul Skerman, Ab Bakker & Stellen Bengtsson
    Security Issues Within the Health Care Environment
    Donald G. Marks, Leonard J. Bins, Peter J. Sell & John R. Campbell
    Security Considerations of Content and Context Based Access Controls
    Jeanette Ohlsson
    The Security Process
    Jon Olnes
    Development of Security Policies
    Bruno Studer
    Secure Network Management
    Andre Van Der Veen, D.P. de Jong, J.F. Bautz, N. Yousef Yengej, A.M.J. van Kempen & P.P.A. van Dam
    Smart: Structured Multi-Dimensional Approach to Risk Taking for Operational Information Systems
    Ross Paul
    Issues In Designing and Implementing a Practical Enterprise Security Architecture
    Pauli Vahtera & Heli Salmi
    Security in EDI Between Bank and Its Client
    Helen J. James & Patrick J. Forde
    A Framework for Information System Security Management
    John Palmer & Alex S.W. Lee
    Investigation of Factors Affecting the Decision to Report Occurrences of Computer Abuse in Western Australian Organisations
    Pieter Van Zyl, M.S. Olivier & S.H. von Solms
    Moss: A Model for Open System Security
    Amund Hunstad
    Security in Virtual Reality: Virtual Security
    Henry B. Wolfe
    Viruses: What Can We Really Do?
    Yisrael Radai
    Integrity Checking For Anti-Viral Purposes - Theory and Practice
    Padgett Peterson
    Securing the Perimeter: Practical Aspects of the Fortress
    Winn Schwartau
    Information Warfare: Waging and Winning Conflict in Cyberspace

Invited Speakers

    N Balausbramanian
    Computer Based Cryptanalysis: Man vs Machine Approach
    Ken van Wyk
    Estabishing a CERT: Computer Emergency Response Team
    Wayne Madsen
    Privacy Aspects of Data Travelling Along the New Highway
    Ross Paul
    Issues in Designing and implementing a Practical Enterprise Security Architecture
Special Appearance
    Winn Schwartau
    Information Warfare: Waging and Winning Conflict in Cyberspace