default search action
SEC 1993: Toronto, Canada
- E. Graham Dougall:
Computer Security, Proceedings of the IFIP TC11, Ninth International Conference on Information Security, IFIP/Sec '93, Toronto, Canada, 12-14 May 1993. IFIP Transactions A-37, North-Holland 1993, ISBN 0-444-81748-4 - Harold Joseph Highland:
A View of Information Security Tomorrow. SEC 1993: 1-11 - Patrick R. Gallagher Jr.:
The Evolution of IT Security Convergence. SEC 1993: 13-22 - Viiveke Fåk, Amund Hunstad:
Teaching security basics: The Importance of When and How. SEC 1993: 23-30 - Dieter Gollmann:
The MSc in Information Security at Royal Holloway. SEC 1993: 31-36 - Guy G. Gable, Harold Joseph Highland:
Information Security in the Small Systems Context: A Framework for Understanding. SEC 1993: 37-51 - Corey D. Schou, William V. Maconachy, James Frost:
Developing Awareness, Training and Education: A Cost Effective Tool for Maintaining System Integrity. SEC 1993: 53-63 - Matt Bishop:
Teaching Computer Security. SEC 1993: 65-74 - A. R. Smith:
The Filter Model of Information Security: A Conceptual Model for Education and Training. SEC 1993: 75-89 - Ed Dawson, Diane M. Donovan:
Shamir's Scheme Says It all. SEC 1993: 91-102 - Peter J. Smith, Michael J. J. Lennon:
LUC: A New Public Key System. SEC 1993: 103-117 - Ping Lin:
The Encapsulated Security Services Interface (ESSI). SEC 1993: 119-135 - Hermann Strack, Kwok-Yan Lam:
Context-Dependent Access Control in Distributed Systems. SEC 1993: 137-155 - Karl H. Krueger:
Internal Control by Objectives: The Functional Control Matrix. SEC 1993: 157-169 - C. J. Bosch, Jan H. P. Eloff, John M. Carroll:
International Standards and Organizational Security Needs: Bridging the Gap. SEC 1993: 171-183 - Alison Anderson, Dennis Longley, Alan B. Tickle:
The Risk Data Repository: A Novel Approach to Security Risk Modelling. SEC 1993: 185-194 - D. Gambel, J. Fowler:
Turning Multiple Evaluated Products into Trusted Systems with Assurance. SEC 1993: 195-205 - Stewart Kowalski:
Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification. SEC 1993: 207-226 - L. M. du Toit, Sebastiaan H. von Solms:
A Model for Organising Information Security Documentation. SEC 1993: 227-242 - Selwyn Russell:
Planning for the EDI of Tomorrow Using Electronic Document Authorization. SEC 1993: 243-251 - Guy G. Gable, Gordon B. Davis:
The EDP Auditor: Disappearing Or Adapting. SEC 1993: 253-266 - Ivan Ekebrink:
Electronic Data Interface (EDI) Security and Audit: A Practical Approach. SEC 1993: 267-275 - Björn Lindberg:
A Generic Security Platform for Workstations. SEC 1993: 277-285 - Louise Yngström:
Evaluation of an Academic Programme in IT Security 1985-1990. SEC 1993: 287-299 - Mikael Larsson:
Fighting the Viruses: Practical Anti-Virus Training. SEC 1993: 301-311 - M. Ohlin:
A Quantitative Accreditation Model - Assessing the Value of Assurance. SEC 1993: 313-325 - Dalenca Pottas, Sebastiaan H. von Solms:
Superseding Manual Generation of Access Control Specification - From Policies to Profiles. SEC 1993: 327-342 - Marshall D. Abrams, Michael V. Joyce:
Extending the ISO Access Framework for Multiple Policies. SEC 1993: 343-358 - K. Subramanian:
Evolution of IT Security in India - Implementation Issues. SEC 1993: 359-367 - Juhani Saari:
Legal Response to a Computer Crime - Retrospect of a "Mere Chance" Case. SEC 1993: 369-373 - Philip M. Stanley:
Information Systems Security and Fraud Prevention in Office Automation Systems. SEC 1993: 375-383 - Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll:
A Process Approach to Information Security Management. SEC 1993: 385-399 - Mahdi Abdelguerfi, Andrea Dunham, Wayne Patterson:
MRA: A Computational Technique for Security in High-Performance Systems. SEC 1993: 401-417
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.