The SCEAS System
Navigation Menu

Conferences in DBLP

(aism)
2004 (conf/aism/2004)

  1. Emiko Terado, Patricia A. H. Williams
    Securing PDAs in the Healthcare Environment. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:4-10 [Conf]
  2. Paul Ashley
    Enforcement of a P3P Privacy Policy. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:11-26 [Conf]
  3. Gim Hiong Soh, Timo Vuori
    New Form of Identity (ID) Theft Crime: Acquiring Personal Information from Your Online Newsletter Providers. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:27-36 [Conf]
  4. C. C. Terence Tan
    Developing a framework for understanding Security Governance. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:37-48 [Conf]
  5. Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells
    Graphical Authentication: Justifications and Objectives. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:49-63 [Conf]
  6. G. Murphy
    An Examination of the Security of Routing Protocol Updates. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:56-63 [Conf]
  7. Malcolm R. Pattinson
    Risk Homeostasis as a Factor of Information Security. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:64-72 [Conf]
  8. Vassilis Dimopoulos, Steven Furnell, Murray Jennex, Ioannis Kritharas
    Approaches to IT Security in Small and Medium Enterprises. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:73-82 [Conf]
  9. Omar Zakaria
    Understanding Challenges of Information Security Culture: A Methodological Issue. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:83-93 [Conf]
  10. Michael Wynne, Peter James
    Securing Data at Rest. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:94-103 [Conf]
  11. A. Jancic, Matthew J. Warren
    PKI - Advantages and Obstacles. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:104-114 [Conf]
  12. Christopher Bolan, Daniel Mende
    Computer Security Research: Approaches and Assumptions. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:115-124 [Conf]
  13. Christopher Bolan
    Need to Know: Security or Liability? [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:125-128 [Conf]
  14. Sabbir Ahmed, Leisa Armstrong
    Securing Web Services with XML aware Digital Signatures. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:129-134 [Conf]
  15. Warren Brooks, Matthew J. Warren
    Health Information Security Evaluation: Continued Development of an Object-Oriented Method. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:135-150 [Conf]
  16. Peter Wolski
    SOHO Wireless Intrusion Detection Systems - Cure or Placebo. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:151-158 [Conf]
  17. Jill Slay, Gerald Quirchmayr
    A Formal Model for the Relationship between Culture and Trust within is Security Management. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:159-166 [Conf]
  18. Mathew Hannan, Basil Tucker
    Risk Management and Organisational Culture: The Implications of Computer Network Attacks and Malware Incidents on Organizational Risk Management. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:167-177 [Conf]
  19. Girish Bhagwan Gokhale, David A. Banks
    Organisational Information Security: A Viable System Perspective. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:178-184 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002