Conferences in DBLP
Harold Joseph Highland A View of Information Security Tomorrow. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:1-11 [Conf ] Patrick R. Gallagher Jr. The Evolution of IT Security Convergence. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:13-22 [Conf ] Viiveke Fåk , Amund Hunstad Teaching security basics: The Importance of When and How. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:23-30 [Conf ] Dieter Gollmann The MSc in Information Security at Royal Holloway. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:31-36 [Conf ] Guy G. Gable , Harold Joseph Highland Information Security in the Small Systems Context: A Framework for Understanding. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:37-51 [Conf ] Corey D. Schou , William V. Maconachy , James Frost Developing Awareness, Training and Education: A Cost Effective Tool for Maintaining System Integrity. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:53-63 [Conf ] Matt Bishop Teaching Computer Security. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:65-74 [Conf ] A. R. Smith The Filter Model of Information Security: A Conceptual Model for Education and Training. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:75-89 [Conf ] Ed Dawson , Diane Donovan Shamir's Scheme Says It all. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:91-102 [Conf ] Peter J. Smith , Michael J. J. Lennon LUC: A New Public Key System. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:103-117 [Conf ] Ping Lin The Encapsulated Security Services Interface (ESSI). [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:119-135 [Conf ] Hermann Strack , Kwok-Yan Lam Context-Dependent Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:137-155 [Conf ] Karl H. Krueger Internal Control by Objectives: The Functional Control Matrix. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:157-169 [Conf ] C. J. Bosch , Jan H. P. Eloff , John M. Carroll International Standards and Organizational Security Needs: Bridging the Gap. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:171-183 [Conf ] Alison Anderson , Dennis Longley , Alan B. Tickle The Risk Data Repository: A Novel Approach to Security Risk Modelling. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:185-194 [Conf ] D. Gambel , J. Fowler Turning Multiple Evaluated Products into Trusted Systems with Assurance. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:195-205 [Conf ] Stewart Kowalski Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:207-226 [Conf ] L. M. du Toit , Sebastiaan H. von Solms A Model for Organising Information Security Documentation. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:227-242 [Conf ] Selwyn Russell Planning for the EDI of Tomorrow Using Electronic Document Authorization. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:243-251 [Conf ] Guy G. Gable , Gordon B. Davis The EDP Auditor: Disappearing Or Adapting. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:253-266 [Conf ] Ivan Ekebrink Electronic Data Interface (EDI) Security and Audit: A Practical Approach. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:267-275 [Conf ] Björn Lindberg A Generic Security Platform for Workstations. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:277-285 [Conf ] Louise Yngström Evaluation of an Academic Programme in IT Security 1985-1990. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:287-299 [Conf ] Mikael Larsson Fighting the Viruses: Practical Anti-Virus Training. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:301-311 [Conf ] M. Ohlin A Quantitative Accreditation Model - Assessing the Value of Assurance. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:313-325 [Conf ] Dalenca Pottas , Sebastiaan H. von Solms Superseding Manual Generation of Access Control Specification - From Policies to Profiles. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:327-342 [Conf ] Marshall D. Abrams , Michael V. Joyce Extending the ISO Access Framework for Multiple Policies. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:343-358 [Conf ] K. Subramanian Evolution of IT Security in India - Implementation Issues. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:359-367 [Conf ] Juhani Saari Legal Response to a Computer Crime - Retrospect of a "Mere Chance" Case. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:369-373 [Conf ] Philip M. Stanley Information Systems Security and Fraud Prevention in Office Automation Systems. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:375-383 [Conf ] Rossouw von Solms , Sebastiaan H. von Solms , John M. Carroll A Process Approach to Information Security Management. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:385-399 [Conf ] Mahdi Abdelguerfi , Andrea Dunham , Wayne Patterson MRA: A Computational Technique for Security in High-Performance Systems. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:401-417 [Conf ]