dblp.uni-trier.dewww.uni-trier.de

Dennis Longley

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
15EEDennis Longley, Mark Branagan, William J. Caelli, Lam-for Kwok: Feasibility of Automated Information Security Compliance Auditing. SEC 2008: 493-508
2006
14EEMark Branagan, Robert Dawson, Dennis Longley: Security Risk Analysis for Complex Systems. ISSA 2006: 1-12
2005
13EEDennis Longley, Mark Branagan: Developing Threat Networks for Risk Analysis of Information Systems. ISSA 2005: 1-10
2004
12 Lam-for Kwok, Dennis Longley: Security Modelling for Risk Analysis. SEC 2004: 29-46
2003
11EEPeggy P. K. Fung, Lam-for Kwok, Dennis Longley: Electronic Information Security Documentation. ACSW Frontiers 2003: 25-31
2001
10 Lam-for Kwok, Peggy P. K. Fung, Dennis Longley: Security Documentation. Conference on Information Security Management & Small Systems Security 2001: 127-140
1999
9EELam-for Kwok, Dennis Longley: Information security management and modelling. Inf. Manag. Comput. Security 7(1): 30-40 (1999)
1997
8 Lam-for Kwok, Dennis Longley: Code of Practice: A Standard for Information Security Management. SEC 1997: 78-90
1996
7EELam-for Kwok, Dennis Longley: A security officer's workbench. Computers & Security 15(8): 695-705 (1996)
1994
6EEAlison Anderson, Dennis Longley, Lam-for Kwok: Security Modelling for Organisations. ACM Conference on Computer and Communications Security 1994: 241-250
5EEDennis Longley, S. Vasudevan: Effect of key generators on the automatic search for flaws in key management schemes. Computers & Security 13(4): 335-347 (1994)
1993
4 Alison Anderson, Dennis Longley, Alan B. Tickle: The Risk Data Repository: A Novel Approach to Security Risk Modelling. SEC 1993: 185-194
3 Dennis Longley, Stephen M. Matyas: Complementarity Attacks and Control Vectors. IBM Systems Journal 32(2): 321-325 (1993)
1992
2 William J. Caelli, Dennis Longley, Alan B. Tickle: A Methodology for Describing Information and Physical Security Architectures. SEC 1992: 277-296
1EEDennis Longley, S. Rigby: An automatic search for security flaws in key management schemes. Computers & Security 11(1): 75-89 (1992)

Coauthor Index

1Alison Anderson [4] [6]
2Mark Branagan [13] [14] [15]
3William J. Caelli [2] [15]
4Robert Dawson [14]
5Peggy P. K. Fung [10] [11]
6Lam-for Kwok [6] [7] [8] [9] [10] [11] [12] [15]
7Stephen M. Matyas [3]
8S. Rigby [1]
9Alan B. Tickle [2] [4]
10S. Vasudevan [5]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)