Conferences in DBLP
(issa) 2002 (conf/issa/2002)
A modified mean value approach to assess security risk. [Citation Graph (, )][DBLP ] Information Security Awareness: Baseline Education and Certification. [Citation Graph (, )][DBLP ] Auditing the Employee in the Work Environment with Regard to Information Security. [Citation Graph (, )][DBLP ] The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System. [Citation Graph (, )][DBLP ] Information Security Policy - What do International Information Security Standards say? [Citation Graph (, )][DBLP ] Comparing Intrusion Detection Tools using Generic Vulnerability Categories. [Citation Graph (, )][DBLP ] A cyclic approach to Business Continuity Planning. [Citation Graph (, )][DBLP ] Information Security Implementation Methodologies. [Citation Graph (, )][DBLP ] Steganography - is it becoming a double-edged sword in computer security? [Citation Graph (, )][DBLP ] Towards a Content-based Billing Model: The Synergy between Access Control and Billing. [Citation Graph (, )][DBLP ] Towards a pattern-based approach for achieving semantic integrity in object-relational databases. [Citation Graph (, )][DBLP ] Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations. [Citation Graph (, )][DBLP ] An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection. [Citation Graph (, )][DBLP ] Minimizing Security Risk Areas revealed by Data mining. [Citation Graph (, )][DBLP ] An Analysis of Anonymity on the Internet. [Citation Graph (, )][DBLP ] A Web-Based Portal For Information Security Education. [Citation Graph (, )][DBLP ] Quantum Cryptography - Advances in computer science may radically alter cryptography. [Citation Graph (, )][DBLP ] On the Semantic Web and its Web of Trust. [Citation Graph (, )][DBLP ] Information Security Health Check. [Citation Graph (, )][DBLP ] Corporate Governance: Information security the weakest link? [Citation Graph (, )][DBLP ] Secure Database Connectivity On The WWW. [Citation Graph (, )][DBLP ] IS Security: User Identification and Authentication - The First Pillar of IS Security. [Citation Graph (, )][DBLP ] Assessing Information Security Culture. [Citation Graph (, )][DBLP ] An Efficient Intrusion Detection System Design. [Citation Graph (, )][DBLP ] Access control and separation of duty in agent-based workflow environments. [Citation Graph (, )][DBLP ] Security architecture of the Microsoft .NET framework. [Citation Graph (, )][DBLP ] Practical Unix Security - Securing IBM's AIX. [Citation Graph (, )][DBLP ] Feedback And Task Analysis For E-Commerce Sites. [Citation Graph (, )][DBLP ]