The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
1993 (conf/sec/1993)

  1. Harold Joseph Highland
    A View of Information Security Tomorrow. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:1-11 [Conf]
  2. Patrick R. Gallagher Jr.
    The Evolution of IT Security Convergence. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:13-22 [Conf]
  3. Viiveke Fåk, Amund Hunstad
    Teaching security basics: The Importance of When and How. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:23-30 [Conf]
  4. Dieter Gollmann
    The MSc in Information Security at Royal Holloway. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:31-36 [Conf]
  5. Guy G. Gable, Harold Joseph Highland
    Information Security in the Small Systems Context: A Framework for Understanding. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:37-51 [Conf]
  6. Corey D. Schou, William V. Maconachy, James Frost
    Developing Awareness, Training and Education: A Cost Effective Tool for Maintaining System Integrity. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:53-63 [Conf]
  7. Matt Bishop
    Teaching Computer Security. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:65-74 [Conf]
  8. A. R. Smith
    The Filter Model of Information Security: A Conceptual Model for Education and Training. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:75-89 [Conf]
  9. Ed Dawson, Diane Donovan
    Shamir's Scheme Says It all. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:91-102 [Conf]
  10. Peter J. Smith, Michael J. J. Lennon
    LUC: A New Public Key System. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:103-117 [Conf]
  11. Ping Lin
    The Encapsulated Security Services Interface (ESSI). [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:119-135 [Conf]
  12. Hermann Strack, Kwok-Yan Lam
    Context-Dependent Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:137-155 [Conf]
  13. Karl H. Krueger
    Internal Control by Objectives: The Functional Control Matrix. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:157-169 [Conf]
  14. C. J. Bosch, Jan H. P. Eloff, John M. Carroll
    International Standards and Organizational Security Needs: Bridging the Gap. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:171-183 [Conf]
  15. Alison Anderson, Dennis Longley, Alan B. Tickle
    The Risk Data Repository: A Novel Approach to Security Risk Modelling. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:185-194 [Conf]
  16. D. Gambel, J. Fowler
    Turning Multiple Evaluated Products into Trusted Systems with Assurance. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:195-205 [Conf]
  17. Stewart Kowalski
    Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:207-226 [Conf]
  18. L. M. du Toit, Sebastiaan H. von Solms
    A Model for Organising Information Security Documentation. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:227-242 [Conf]
  19. Selwyn Russell
    Planning for the EDI of Tomorrow Using Electronic Document Authorization. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:243-251 [Conf]
  20. Guy G. Gable, Gordon B. Davis
    The EDP Auditor: Disappearing Or Adapting. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:253-266 [Conf]
  21. Ivan Ekebrink
    Electronic Data Interface (EDI) Security and Audit: A Practical Approach. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:267-275 [Conf]
  22. Björn Lindberg
    A Generic Security Platform for Workstations. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:277-285 [Conf]
  23. Louise Yngström
    Evaluation of an Academic Programme in IT Security 1985-1990. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:287-299 [Conf]
  24. Mikael Larsson
    Fighting the Viruses: Practical Anti-Virus Training. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:301-311 [Conf]
  25. M. Ohlin
    A Quantitative Accreditation Model - Assessing the Value of Assurance. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:313-325 [Conf]
  26. Dalenca Pottas, Sebastiaan H. von Solms
    Superseding Manual Generation of Access Control Specification - From Policies to Profiles. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:327-342 [Conf]
  27. Marshall D. Abrams, Michael V. Joyce
    Extending the ISO Access Framework for Multiple Policies. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:343-358 [Conf]
  28. K. Subramanian
    Evolution of IT Security in India - Implementation Issues. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:359-367 [Conf]
  29. Juhani Saari
    Legal Response to a Computer Crime - Retrospect of a "Mere Chance" Case. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:369-373 [Conf]
  30. Philip M. Stanley
    Information Systems Security and Fraud Prevention in Office Automation Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:375-383 [Conf]
  31. Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll
    A Process Approach to Information Security Management. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:385-399 [Conf]
  32. Mahdi Abdelguerfi, Andrea Dunham, Wayne Patterson
    MRA: A Computational Technique for Security in High-Performance Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:401-417 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002