|
Search the dblp DataBase
Maria Karyda:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas
An ontology for secure e-government applications. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:1033-1037 [Conf]
- Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas
Electronic Voting Systems: Security Implications of the Administrative Workflow. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:467-471 [Conf]
- Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis
Incorporating Security Requirements Into the Software Development Process. [Citation Graph (0, 0)][DBLP] ECIW, 2005, pp:21-28 [Conf]
- Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos
Elaborating Quantitative Approaches for IT Security Evaluation. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:67-78 [Conf]
- Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis
Redefining Information Systems Security: Viable Information Systems. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:453-468 [Conf]
- Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis
Content, Context, Process Analysis of IS Security Policy Formation. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:145-156 [Conf]
- Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas
A Framework for Exploiting Security Expertise in Application Development. [Citation Graph (0, 0)][DBLP] TrustBus, 2006, pp:62-70 [Conf]
- Maria Karyda, Evangelos A. Kiountouzis, Spyros Kokolakis
Information systems security policies: a contextual perspective. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:3, pp:246-260 [Journal]
- Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis
The insider threat to information systems and the effectiveness of ISO17799. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:6, pp:472-484 [Journal]
- Lilian Mitrou, Maria Karyda
Employees' privacy vs. employers' security: Can they be balanced? [Citation Graph (0, 0)][DBLP] Telematics and Informatics, 2006, v:23, n:3, pp:164-178 [Journal]
- Christos Fragos, Maria Karyda, Evangelos A. Kiountouzis
Using the Lens of Circuits of Power in Information Systems Security Management. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:228-236 [Conf]
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. [Citation Graph (, )][DBLP]
Employing Ontologies for the Development of Security Critical Applications. [Citation Graph (, )][DBLP]
Analyzing Information Security Awareness through Networks of Association. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|