The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP TC11/WG11.1 Publications (ifip11-1)
2001 (conf/ifip11-1/2001)

  1. Les Labuschagne
    Web Asssurance: Information Security Management for e-commerce. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:1-12 [Conf]
  2. C. Margaritis, N. Kolokotronis, Panagiota Papadopoulou, Panagiotis Kanellis, Drakoulis Martakos
    A Model and Implementation Guidelines for Information Security Strategies in Web Environments. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:13-34 [Conf]
  3. Bethuel Roberto Vinaja
    A Three-Dimensional Framework for Security Implementation in Mobile Environments. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:35-44 [Conf]
  4. Wesley Brandi, Martin S. Olivier
    Maintaining Integrity within Mobile Self Protecting Objects. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:45-56 [Conf]
  5. Edo Roos Lindgreen, Jaap Acohen, Hans de Boer, Gerrit Uit de Bosch, Cees van Rinsum
    Building on Solid Foundations: An Information Security Case Study. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:57-72 [Conf]
  6. Elton Saul, Andrew Hutchison
    Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:73-86 [Conf]
  7. Steven Furnell, Maria Papadaki, G. Magklaras, A. Alayed
    Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:87-98 [Conf]
  8. Mikko T. Siponen, Richard Baskerville
    A New Paradigm for Adding Security Into IS Development Methods. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:99-112 [Conf]
  9. John Biggam, Alan Hogarth
    Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:113-126 [Conf]
  10. Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
    Security Documentation. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:127-140 [Conf]
  11. Elmé Smith, Jan H. P. Eloff
    Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:141-156 [Conf]
  12. Matthew J. Warren, William Hutchinson
    A Security Method for Healthcare Organisations. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:157-166 [Conf]
  13. Gurpreet Dhillon, Leiser Silva
    Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:167-182 [Conf]
  14. Karen A. Forcht, Christopher Allen, Barbara Brodman, David Corning, Jacob Kouns
    Intrusion Detection Systems: Possibilities for the Future. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:183-198 [Conf]
  15. Fredrik Björck
    Implementing Information Security Management Systems. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:199-214 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002