The SCEAS System
Navigation Menu

Conferences in DBLP

(issa)
2002 (conf/issa/2002)


  1. A modified mean value approach to assess security risk. [Citation Graph (, )][DBLP]


  2. Information Security Awareness: Baseline Education and Certification. [Citation Graph (, )][DBLP]


  3. Auditing the Employee in the Work Environment with Regard to Information Security. [Citation Graph (, )][DBLP]


  4. The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System. [Citation Graph (, )][DBLP]


  5. Information Security Policy - What do International Information Security Standards say? [Citation Graph (, )][DBLP]


  6. Comparing Intrusion Detection Tools using Generic Vulnerability Categories. [Citation Graph (, )][DBLP]


  7. A cyclic approach to Business Continuity Planning. [Citation Graph (, )][DBLP]


  8. Information Security Implementation Methodologies. [Citation Graph (, )][DBLP]


  9. Steganography - is it becoming a double-edged sword in computer security? [Citation Graph (, )][DBLP]


  10. Towards a Content-based Billing Model: The Synergy between Access Control and Billing. [Citation Graph (, )][DBLP]


  11. Towards a pattern-based approach for achieving semantic integrity in object-relational databases. [Citation Graph (, )][DBLP]


  12. Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations. [Citation Graph (, )][DBLP]


  13. An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection. [Citation Graph (, )][DBLP]


  14. Minimizing Security Risk Areas revealed by Data mining. [Citation Graph (, )][DBLP]


  15. An Analysis of Anonymity on the Internet. [Citation Graph (, )][DBLP]


  16. A Web-Based Portal For Information Security Education. [Citation Graph (, )][DBLP]


  17. Quantum Cryptography - Advances in computer science may radically alter cryptography. [Citation Graph (, )][DBLP]


  18. On the Semantic Web and its Web of Trust. [Citation Graph (, )][DBLP]


  19. Information Security Health Check. [Citation Graph (, )][DBLP]


  20. Corporate Governance: Information security the weakest link? [Citation Graph (, )][DBLP]


  21. Secure Database Connectivity On The WWW. [Citation Graph (, )][DBLP]


  22. IS Security: User Identification and Authentication - The First Pillar of IS Security. [Citation Graph (, )][DBLP]


  23. Assessing Information Security Culture. [Citation Graph (, )][DBLP]


  24. An Efficient Intrusion Detection System Design. [Citation Graph (, )][DBLP]


  25. Access control and separation of duty in agent-based workflow environments. [Citation Graph (, )][DBLP]


  26. Security architecture of the Microsoft .NET framework. [Citation Graph (, )][DBLP]


  27. Practical Unix Security - Securing IBM's AIX. [Citation Graph (, )][DBLP]


  28. Feedback And Task Analysis For E-Commerce Sites. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002