Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon (Eds.):
Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA.
IFIP Conference Proceedings 200 Kluwer 2001, ISBN 0-7923-7506-8 BibTeX
@proceedings{DBLP:conf/ifip11-1/2001,
editor = {Jan H. P. Eloff and
Les Labuschagne and
Rossouw von Solms and
Gurpreet Dhillon},
title = {Advances in Information Security Management {\&} Small Systems
Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference
on Information Security Management {\&} Small Systems Security,
September 27-28, 2001, Las Vegas, Nevada, USA},
booktitle = {Conference on Information Security Management {\&} Small Systems
Security},
publisher = {Kluwer},
series = {IFIP Conference Proceedings},
volume = {200},
year = {2001},
isbn = {0-7923-7506-8},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Reviewed papers
- Les Labuschagne:
Web Asssurance: Information Security Management for e-commerce.
1-12 BibTeX
- C. Margaritis, N. Kolokotronis, Panagiota Papadopoulou, Panagiotis Kanellis, Drakoulis Martakos:
A Model and Implementation Guidelines for Information Security Strategies in Web Environments.
13-34 BibTeX
- Bethuel Roberto Vinaja:
A Three-Dimensional Framework for Security Implementation in Mobile Environments.
35-44 BibTeX
- Wesley Brandi, Martin S. Olivier:
Maintaining Integrity within Mobile Self Protecting Objects.
45-56 BibTeX
- Edo Roos Lindgreen, Jaap Acohen, Hans de Boer, Gerrit Uit de Bosch, Cees van Rinsum:
Building on Solid Foundations: An Information Security Case Study.
57-72 BibTeX
- Elton Saul, Andrew Hutchison:
Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II.
73-86 BibTeX
- Steven Furnell, Maria Papadaki, G. Magklaras, A. Alayed:
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks.
87-98 BibTeX
- Mikko T. Siponen, Richard Baskerville:
A New Paradigm for Adding Security Into IS Development Methods.
99-112 BibTeX
- John Biggam, Alan Hogarth:
Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module.
113-126 BibTeX
- Lam-for Kwok, Peggy P. K. Fung, Dennis Longley:
Security Documentation.
127-140 BibTeX
- Elmé Smith, Jan H. P. Eloff:
Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques.
141-156 BibTeX
- Matthew J. Warren, William Hutchinson:
A Security Method for Healthcare Organisations.
157-166 BibTeX
- Gurpreet Dhillon, Leiser Silva:
Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study.
167-182 BibTeX
- Karen A. Forcht, Christopher Allen, Barbara Brodman, David Corning, Jacob Kouns:
Intrusion Detection Systems: Possibilities for the Future.
183-198 BibTeX
- Fredrik Björck:
Implementing Information Security Management Systems.
199-214 BibTeX
Copyright © Sat May 16 23:23:03 2009
by Michael Ley (ley@uni-trier.de)