Conference on Information Security Management & Small Systems Security最新文献

筛选
英文 中文
A New Paradigm for Adding Security Into IS Development Methods 在信息系统开发方法中增加安全性的新范例
Conference on Information Security Management & Small Systems Security Pub Date : 2001-09-27 DOI: 10.1007/0-306-47007-1_8
M. Siponen, R. Baskerville
{"title":"A New Paradigm for Adding Security Into IS Development Methods","authors":"M. Siponen, R. Baskerville","doi":"10.1007/0-306-47007-1_8","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_8","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A Security Method for Healthcare Organisations 医疗机构的安全方法
Conference on Information Security Management & Small Systems Security Pub Date : 2001-09-27 DOI: 10.1007/0-306-47007-1_12
M. Warren, W. Hutchinson
{"title":"A Security Method for Healthcare Organisations","authors":"M. Warren, W. Hutchinson","doi":"10.1007/0-306-47007-1_12","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_12","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115971306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques 基于交易的风险分析-使用认知模糊技术
Conference on Information Security Management & Small Systems Security Pub Date : 2001-09-27 DOI: 10.1007/0-306-47007-1_11
Elmé Smith, J. Eloff
{"title":"Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques","authors":"Elmé Smith, J. Eloff","doi":"10.1007/0-306-47007-1_11","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_11","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II 使用Gypsie, Gynger和Visual GNY分析SPEAR II中的加密协议
Conference on Information Security Management & Small Systems Security Pub Date : 2001-09-27 DOI: 10.1007/0-306-47007-1_6
E. Saul, A. Hutchison
{"title":"Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II","authors":"E. Saul, A. Hutchison","doi":"10.1007/0-306-47007-1_6","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_6","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127778627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Model and Implementation Guidelines for Information Security Strategies in Web Environments 网络环境下信息安全策略的模型与实现指南
Conference on Information Security Management & Small Systems Security Pub Date : 2001-09-27 DOI: 10.1007/0-306-47007-1_2
C. Margaritis, N. Kolokotronis, Panagiota Papadopoulou, P. Kanellis, D. Martakos
{"title":"A Model and Implementation Guidelines for Information Security Strategies in Web Environments","authors":"C. Margaritis, N. Kolokotronis, Panagiota Papadopoulou, P. Kanellis, D. Martakos","doi":"10.1007/0-306-47007-1_2","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_2","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122999864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study 在疟疾研究中心解释计算机相关犯罪:一个案例研究
Conference on Information Security Management & Small Systems Security Pub Date : 2001-09-27 DOI: 10.1007/0-306-47007-1_13
G. Dhillon, Leiser Silva
{"title":"Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study","authors":"G. Dhillon, Leiser Silva","doi":"10.1007/0-306-47007-1_13","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_13","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Documentation 安全文档
Conference on Information Security Management & Small Systems Security Pub Date : 2001-09-27 DOI: 10.1007/0-306-47007-1_10
Lam-for Kwok, Peggy P. K. Fung, D. Longley
{"title":"Security Documentation","authors":"Lam-for Kwok, Peggy P. K. Fung, D. Longley","doi":"10.1007/0-306-47007-1_10","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_10","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"432 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116006344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementing Information Security Management Systems 推行资讯保安管理制度
Conference on Information Security Management & Small Systems Security Pub Date : 2001-09-27 DOI: 10.1007/0-306-47007-1_15
F. Björck
{"title":"Implementing Information Security Management Systems","authors":"F. Björck","doi":"10.1007/0-306-47007-1_15","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_15","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115208072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Three-Dimensional Framework for Security Implementation in Mobile Environments 移动环境中安全实现的三维框架
Conference on Information Security Management & Small Systems Security Pub Date : 2001-09-27 DOI: 10.1007/0-306-47007-1_3
Bethuel Roberto Vinaja
{"title":"A Three-Dimensional Framework for Security Implementation in Mobile Environments","authors":"Bethuel Roberto Vinaja","doi":"10.1007/0-306-47007-1_3","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_3","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133190123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module 运用软系统方法促进计算机安全教学模块的开发
Conference on Information Security Management & Small Systems Security Pub Date : 2001-09-27 DOI: 10.1007/0-306-47007-1_9
J. Biggam, A. Hogarth
{"title":"Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module","authors":"J. Biggam, A. Hogarth","doi":"10.1007/0-306-47007-1_9","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_9","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133534039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信