Search the dblp DataBase
Spyros Kokolakis :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Maria Karyda , Theodoros Balopoulos , Lazaros Gymnopoulos , Spyros Kokolakis , Costas Lambrinoudakis , Stefanos Gritzalis , Stelios Dritsas An ontology for secure e-government applications. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:1033-1037 [Conf ] Spyros Kokolakis Is there a Need for New Information Security Models? [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:256-267 [Conf ] Costas Lambrinoudakis , Spyros Kokolakis , Maria Karyda , Vassilis Tsoumas , Dimitris Gritzalis , Sokratis K. Katsikas Electronic Voting Systems: Security Implications of the Administrative Workflow. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:467-471 [Conf ] Theodoros Balopoulos , Stelios Dritsas , Lazaros Gymnopoulos , Maria Karyda , Spyros Kokolakis , Stefanos Gritzalis Incorporating Security Requirements Into the Software Development Process. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:21-28 [Conf ] Euripidis Loukis , Spyros Kokolakis Computer Supported Collaboration in the Public Sector: The ICTE-PAN Project. [Citation Graph (0, 0)][DBLP ] EGOV, 2003, pp:181-186 [Conf ] Spyros Kokolakis , Costas Lambrinoudakis , Dimitris Gritzalis A Knowledge-Based Repository Model for Security Policies Management. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:112-121 [Conf ] S. Ikonomopoulos , Costas Lambrinoudakis , Dimitris Gritzalis , Spyros Kokolakis , K. Vassiliou Functional Requirements for a Secure Electronic Voting System. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:507-520 [Conf ] Maria Karyda , Spyros Kokolakis , Evangelos A. Kiountouzis Redefining Information Systems Security: Viable Information Systems. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:453-468 [Conf ] Maria Karyda , Spyros Kokolakis , Evangelos A. Kiountouzis Content, Context, Process Analysis of IS Security Policy Formation. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:145-156 [Conf ] Evangelos A. Kiountouzis , Spyros Kokolakis An analyst's view of IS security. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:23-35 [Conf ] Theodore Tryfonas , Dimitris Gritzalis , Spyros Kokolakis A Qualitative Approach to Information Availability. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:37-48 [Conf ] Theodoros Balopoulos , Lazaros Gymnopoulos , Maria Karyda , Spyros Kokolakis , Stefanos Gritzalis , Sokratis K. Katsikas A Framework for Exploiting Security Expertise in Application Development. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:62-70 [Conf ] Maria Karyda , Evangelos A. Kiountouzis , Spyros Kokolakis Information systems security policies: a contextual perspective. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:3, pp:246-260 [Journal ] Spyros Kokolakis , Evangelos A. Kiountouzis Achieving Interoperability in a Multiple-Security- Policies Environment. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:3, pp:267-281 [Journal ] Marianthi Theoharidou , Spyros Kokolakis , Maria Karyda , Evangelos A. Kiountouzis The insider threat to information systems and the effectiveness of ISO17799. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:6, pp:472-484 [Journal ] Spyros Kokolakis , A. J. Demopoulos , Evangelos A. Kiountouzis The use of business process modelling in information systems security analysis and design. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:107-116 [Journal ] Diomidis Spinellis , Spyros Kokolakis , Stefanos Gritzalis Security requirements, risks and recommendations for small enterprise and home-office environments. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1999, v:7, n:3, pp:121-128 [Journal ] Aggeliki Tsohou , Marianthi Theoharidou , Spyros Kokolakis , Dimitris Gritzalis Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:24-33 [Conf ] Employing Ontologies for the Development of Security Critical Applications. [Citation Graph (, )][DBLP ] Analyzing Information Security Awareness through Networks of Association. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs