default search action
International Information Security Workshops 2004: Toulouse, France
part of IFIP World Congress 2004
10th IFIP WG 11.1 Annual Working Conference on Information Security Management
- Johan Van Niekerk, Rossouw von Solms:
Corporate Information Security Education: Is Outcomes Based Education the Solution? 3-18 - Kerry-Lynn Thomson, Rossouw von Solms:
Towards Corporate Information Security Obedience. 19-32 - T. B. Busuttil, Matthew J. Warren:
CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection. 33-50 - Aung Htike Phyo, Steven Furnell, Francisco Portilla:
A Framework For Role-based Monitoring of Insider Misuse. 51-66 - Andrew M. Colarik, Clark D. Thomborson, Lech J. Janczewski:
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications. 67-80 - Kevin O'Sullivan, Karen Neville, Ciara Heavin:
Investigating a Smart Technology. 81-98
IFIP TC11 WG 11.8 - Information Security Education Workshop
- Natalia Miloslavskaia, Alexander Tolstoi, Dmitriy Ushakov:
Laboratory Support for Information Security Education. 101-116 - Louise Yngström:
An Holistic Approach to an International Doctoral Program in Information Security. 117-132 - Nimal Jayaratna:
A New Paradigm for Information Security Education at Doctoral Level. 133-140 - V. Gorbatov, A. Maluk, Natalia Miloslavskaia, Alexander Tolstoi:
Highly Qualified Information Security Personnel Training in Russia. 141-146 - Jill Slay:
Doctor of Philosophy: IT Security. 147-152 - Sokratis K. Katsikas:
Doctoral Programme on Information and Communication Systems Security at the University of the Aegean. 153-158 - Gerald Quirchmayr:
An International Security Perspective. 159-164 - Ronald Dodge:
Do Military Forces Need Ph.D.s? 165-172 - Cynthia E. Irvine, Timothy E. Levin:
A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach. 173-180
I-NetSec04 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems
- Andreas Pashalidis, Chris J. Mitchell:
A Security Model for Anonymous Credential Systems. 183-198 - Alexander Iliev, Sean W. Smith:
Private Information Storage with Logarithm-Space Secure Hardware. 199-214 - Claudia Díaz, Bart Preneel:
Taxonomy of Mixes and Dummy Traffic. 215-230 - Tobias Baier, Christian Philip Kunze:
Identity Management for Self-Portrayal. 231-244 - Marco Voss:
Privacy Preserving Online Reputation Systems. 245-260 - Els Van Herreweghen:
A Risk Driven Approach to Designing Privacy Enhanced Secure. 261-276 - Andreas Jacobsson, Martin Boldt, Bengt Carlsson:
Privacy Invasive Software in File-Sharing Tools. 277-292 - Alex Cameron:
Infusing Privacy Norms in DRM - Incentives and Perspectives from Law. 293-309
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.