|
Search the dblp DataBase
Lech J. Janczewski:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Grace SauLan Loo, Bondic C. P. Tang, Lech J. Janczewski
An Adaptable Human-Agent Collaboration Information System in Manufacturing (HACISM). [Citation Graph (0, 0)][DBLP] DEXA Workshop, 2000, pp:445-452 [Conf]
- Andrew M. Colarik, Clark D. Thomborson, Lech J. Janczewski
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications. [Citation Graph (0, 0)][DBLP] International Information Security Workshops, 2004, pp:67-80 [Conf]
- Lech J. Janczewski
Current information security protocols and an outlook for the future. [Citation Graph (0, 0)][DBLP] IRMA Conference, 2000, pp:578-581 [Conf]
- Lech J. Janczewski
Data Security Model for Branch Offices of Big Organisations. [Citation Graph (0, 0)][DBLP] SEC, 1992, pp:153-164 [Conf]
- Lech J. Janczewski, Andrew M. Colarik
World Framework for Security Benchmark Changes. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:397-400 [Conf]
- Lech J. Janczewski, Victor Portougal
Assignment of Security Clearances in an Organization. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:51-64 [Conf]
- Erland Jonsson, Lech J. Janczewski
A taxonomy and overview of information security experiments. [Citation Graph (0, 0)][DBLP] SEC, 1997, pp:139-150 [Conf]
- Lech J. Janczewski, Frank Xinli Shi
Development of Information Security Baselines for Healthcare Information Systems in New Zealand. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:2, pp:172-192 [Journal]
- Lech J. Janczewski, Victor Portougal
"Need-to-know" principle and fuzzy security clearances modelling. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:210-217 [Journal]
- Victor Portougal, Lech J. Janczewski
Industrial information-weight security models. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:205-211 [Journal]
Search in 0.001secs, Finished in 0.002secs
|