The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP TC11 Publications (ifip11)
2004 (conf/ifip11/2004)

  1. Johan Van Niekerk, Rossouw von Solms
    Corporate Information Security Education: Is Outcomes Based Education the Solution? [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:3-18 [Conf]
  2. Kerry-Lynn Thomson, Rossouw von Solms
    Towards Corporate Information Security Obedience. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:19-32 [Conf]
  3. T. B. Busuttil, Matthew J. Warren
    CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:33-50 [Conf]
  4. Aung Htike Phyo, Steven Furnell, Francisco Portilla
    A Framework For Role-based Monitoring of Insider Misuse. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:51-66 [Conf]
  5. Andrew M. Colarik, Clark D. Thomborson, Lech J. Janczewski
    Update/Patch Management Systems: A Protocol Taxonomy with Security Implications. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:67-80 [Conf]
  6. Kevin O'Sullivan, Karen Neville, Ciara Heavin
    Investigating a Smart Technology. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:81-98 [Conf]
  7. Natalia Miloslavskaia, Alexander Tolstoi, Dmitriy Ushakov
    Laboratory Support for Information Security Education. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:101-116 [Conf]
  8. Louise Yngström
    An Holistic Approach to an International Doctoral Program in Information Security. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:117-132 [Conf]
  9. Nimal Jayaratna
    A New Paradigm for Information Security Education at Doctoral Level. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:133-140 [Conf]
  10. V. Gorbatov, A. Maluk, Natalia Miloslavskaia, Alexander Tolstoi
    Highly Qualified Information Security Personnel Training in Russia. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:141-146 [Conf]
  11. Jill Slay
    Doctor of Philosophy: IT Security. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:147-152 [Conf]
  12. Sokratis K. Katsikas
    Doctoral Programme on Information and Communication Systems Security at the University of the Aegean. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:153-158 [Conf]
  13. Gerald Quirchmayr
    An International Security Perspective. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:159-164 [Conf]
  14. Ronald Dodge
    Do Military Forces Need Ph.D.s? [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:165-172 [Conf]
  15. Cynthia E. Irvine, Timothy E. Levin
    A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:173-180 [Conf]
  16. Andreas Pashalidis, Chris J. Mitchell
    A Security Model for Anonymous Credential Systems. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:183-198 [Conf]
  17. Alexander Iliev, Sean W. Smith
    Private Information Storage with Logarithm-Space Secure Hardware. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:199-214 [Conf]
  18. Claudia Díaz, Bart Preneel
    Taxonomy of Mixes and Dummy Traffic. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:215-230 [Conf]
  19. Tobias Baier, Christian P. Kunze
    Identity Management for Self-Portrayal. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:231-244 [Conf]
  20. Marco Voss
    Privacy Preserving Online Reputation Systems. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:245-260 [Conf]
  21. Els Van Herreweghen
    A Risk Driven Approach to Designing Privacy Enhanced Secure. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:261-276 [Conf]
  22. Andreas Jacobsson, Martin Boldt, Bengt Carlsson
    Privacy Invasive Software in File-Sharing Tools. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:277-292 [Conf]
  23. Alex Cameron
    Infusing Privacy Norms in DRM - Incentives and Perspectives from Law. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:293-309 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002