default search action
Search dblp for Publications
export results for "toc:db/conf/aism/aism2004.bht:"
@inproceedings{DBLP:conf/aism/AhmedA04, author = {Sabbir Ahmed and Leisa J. Armstrong}, title = {Securing Web Services with {XML} aware Digital Signatures}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {129--134}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 17 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aism/AhmedA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/Ashley04, author = {Paul Ashley}, title = {Enforcement of a {P3P} Privacy Policy}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {11--26}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/Ashley04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/Bolan04, author = {Christopher Bolan}, title = {Need to Know: Security or Liability?}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {125--128}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/Bolan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/BolanM04, author = {Christopher Bolan and Daniel Mende}, title = {Computer Security Research: Approaches and Assumptions}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {115--124}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/BolanM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/BrooksW04, author = {Warren Brooks and Matthew J. Warren}, title = {Health Information Security Evaluation: Continued Development of an Object-Oriented Method}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {135--150}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/BrooksW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/DimopoulosFJK04, author = {Vassilis Dimopoulos and Steven Furnell and Murray E. Jennex and Ioannis Kritharas}, title = {Approaches to {IT} Security in Small and Medium Enterprises}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {73--82}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aism/DimopoulosFJK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/GokhaleB04, author = {Girish Bhagwan Gokhale and David A. Banks}, title = {Organisational Information Security: {A} Viable System Perspective}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {178--184}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/GokhaleB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/HannanT04, author = {Mathew Hannan and Basil Tucker}, title = {Risk Management and Organisational Culture: The Implications of Computer Network Attacks and Malware Incidents on Organizational Risk Management}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {167--177}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/HannanT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/JancicW04, author = {A. Jancic and Matthew J. Warren}, title = {{PKI} - Advantages and Obstacles}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {104--114}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/JancicW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/Murphy04, author = {G. Murphy}, title = {An Examination of the Security of Routing Protocol Updates}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {56--63}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/Murphy04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/Pattinson04, author = {Malcolm R. Pattinson}, title = {Risk Homeostasis as a Factor of Information Security}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {64--72}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/Pattinson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/PierceWMW04, author = {Justin D. Pierce and Matthew J. Warren and David R. Mackay and Jason G. Wells}, title = {Graphical Authentication: Justifications and Objectives}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {49--63}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/PierceWMW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/SlayQ04, author = {Jill Slay and Gerald Quirchmayr}, title = {A Formal Model for the Relationship between Culture and Trust within is Security Management}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {159--166}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/SlayQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/SohV04, author = {Gim Hiong Soh and Timo Vuori}, title = {New Form of Identity {(ID)} Theft Crime: Acquiring Personal Information from Your Online Newsletter Providers}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {27--36}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/SohV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/Tan04, author = {C. C. Terence Tan}, title = {Developing a framework for understanding Security Governance}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {37--48}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/Tan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/TeradoW04, author = {Emiko Terado and Patricia A. H. Williams}, title = {Securing PDAs in the Healthcare Environment}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {4--10}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/TeradoW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/Wolski04, author = {Peter Wolski}, title = {{SOHO} Wireless Intrusion Detection Systems - Cure or Placebo}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {151--158}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/Wolski04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/WynneJ04, author = {Michael Wynne and Peter James}, title = {Securing Data at Rest}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {94--103}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/WynneJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/Zakaria04, author = {Omar Zakaria}, title = {Understanding Challenges of Information Security Culture: {A} Methodological Issue}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {83--93}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/Zakaria04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aism/2004, title = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, isbn = {0-7298-0572-7}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.