{"title":"A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach","authors":"C. Irvine, T. Levin","doi":"10.1007/1-4020-8145-6_15","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_15","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115388792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An International Security Perspective","authors":"G. Quirchmayr","doi":"10.1007/1-4020-8145-6_13","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_13","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"42 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120929454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doctor of Philosophy: IT Security","authors":"J. Slay","doi":"10.1007/1-4020-8145-6_11","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_11","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"37 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134259902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Gorbatov, A. Maluk, N. Miloslavskaia, A. Tolstoĭ
{"title":"Highly Qualified Information Security Personnel Training in Russia","authors":"V. Gorbatov, A. Maluk, N. Miloslavskaia, A. Tolstoĭ","doi":"10.1007/1-4020-8145-6_10","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_10","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115014994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Corporate Information Security Education: Is Outcomes Based Education the Solution?","authors":"J. V. Niekerk, R. V. Solms","doi":"10.1007/1-4020-8145-6_1","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_1","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124418162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Holistic Approach to an International Doctoral Program in Information Security","authors":"L. Yngström","doi":"10.1007/1-4020-8145-6_8","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_8","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129307964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Paradigm for Information Security Education at Doctoral Level","authors":"N. Jayaratna","doi":"10.1007/1-4020-8145-6_9","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_9","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Model for Anonymous Credential Systems","authors":"A. Pashalidis, C. Mitchell","doi":"10.1007/1-4020-8145-6_16","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_16","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132804078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}