default search action
Lance J. Hoffman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c15]Rachelle S. Heller, Costis Toregas, Lance J. Hoffman:
Reach to Teach: Preparing Cybersecurity Experts as Adjunct Community College Faculty. CSEDU (1) 2019: 338-343 - 2012
- [j24]Lance J. Hoffman, Diana L. Burley, Costis Toregas:
Holistically Building the Cybersecurity Workforce. IEEE Secur. Priv. 10(2): 33-39 (2012) - [c14]Ronald Dodge, Costis Toregas, Lance J. Hoffman:
Cybersecurity Workforce Development Directions. HAISA 2012: 1-12
2000 – 2009
- 2009
- [j23]Stephen Cooper, Christine Nickell, Victor P. Piotrowski Jr., Brenda Oldfield, Ali E. Abdallah, Matt Bishop, Bill Caelli, Melissa Dark, Elizabeth K. Hawthorne, Lance J. Hoffman, Lance C. Pérez, Charles P. Pfleeger, Richard A. Raines, Corey D. Schou, Joel Brynielsson:
An exploration of the current state of information assurance education. ACM SIGCSE Bull. 41(4): 109-125 (2009) - 2006
- [j22]Lance J. Hoffman, Kim Lawson-Jenkins, Jeremy J. Blum:
Trust beyond security: an expanded trust model. Commun. ACM 49(7): 94-101 (2006) - [j21]Timothy Rosenberg, Lance J. Hoffman:
Taking Networks on the Road: Portable Solutions for Security Educators. IEEE Secur. Priv. 4(1): 57-60 (2006) - [j20]Timothy Rosenberg, Lance J. Hoffman:
Taking the network on the road: Portable network solutions for computer security educators. ACM J. Educ. Resour. Comput. 6(4): 2 (2006) - 2005
- [j19]Lance J. Hoffman, Timothy Rosenberg, Ronald Dodge, Daniel Ragsdale:
Exploring a National Cybersecurity Exercise for Universities. IEEE Secur. Priv. 3(5): 27-33 (2005) - 2004
- [j18]Jeremy J. Blum, Azim Eskandarian, Lance J. Hoffman:
Challenges of intervehicle ad hoc networks. IEEE Trans. Intell. Transp. Syst. 5(4): 347-351 (2004) - 2003
- [c13]Lance J. Hoffman, Timothy Rosenberg, Steve Willmore:
The Portable Educational Network (PEN). IAW 2003: 217-220 - 2002
- [c12]Lance J. Hoffman:
Motivations behind a role play at CFP: repeated assaults on the constitution by extremist property rights advocates. CFP 2002: 1:1-1:4 - 2001
- [j17]Lance J. Hoffman, Lorrie Faith Cranor:
Internet voting for public officials: introduction. Commun. ACM 44(1): 69-71 (2001) - 2000
- [c11]Lance J. Hoffman:
Internet voting: will it spur or corrupt democracy? CFP 2000: 219-223
1990 – 1999
- 1999
- [j16]Rachna Dhamija, Rachelle S. Heller, Lance J. Hoffman:
Teaching E-Commerce to a Multidisciplinary Class. Commun. ACM 42(9): 50-55 (1999) - 1994
- [j15]Lance J. Hoffman, Faraz A. Ali, Steven L. Heckler, Ann Huybrechts:
Cryptography Policy. Commun. ACM 37(9): 109-117 (1994) - [j14]Paul C. Clark, Lance J. Hoffman:
BITS: A Smartcard Protected Operating System. Commun. ACM 37(11): 66-70 (1994) - 1993
- [j13]John A. Fitch III, Lance J. Hoffman:
A shortest path network security model. Comput. Secur. 12(2): 169-189 (1993) - [j12]Lance J. Hoffman:
Bugging the Digital Network. Inf. Secur. J. A Glob. Perspect. 1(4): 12-15 (1993) - [c10]John A. Fitch III, Lance J. Hoffman:
On the shortest path to network security. ACSAC 1993: 149-158 - 1992
- [c9]Lance J. Hoffman:
Reducing Society's Vulnerability as Computers and Networks Proliferate. IFIP Congress (2) 1992: 554-563 - [e1]Lance J. Hoffman:
Proceedings of the Second Conference on Computers, Freedom and Privacy, CFP 1992, Washington, D.C., USA, March 18-20, 1992. ACM 1992, ISBN 978-0-89791-553-3 [contents] - 1991
- [j11]Lance J. Hoffman, Paul C. Clark:
Imminent policy considerations in the design and management of national and international computer networks. IEEE Commun. Mag. 29(2): 68-74 (1991) - 1990
- [c8]William M. Garrabrants, Alfred W. Ellis III, Lance J. Hoffman, Magdi N. Kamel:
CERTS: a comparative evaluation method for risk management methodologies and tools. ACSAC 1990: 251-257 - [c7]Lance J. Hoffman, Russell J. Davis:
Security pipeline interface (SPI). ACSAC 1990: 349-355
1980 – 1989
- 1989
- [j10]Lance J. Hoffman:
Risk analysis and computer security: Towards a theory at last. Comput. Secur. 8(1): 23-24 (1989) - [j9]Lance J. Hoffman:
Smoking out the bad actors: Risk analysis in the age of the microcomputer. Comput. Secur. 8(4): 325-344 (1989) - 1986
- [j8]Lance J. Hoffman, Lucy M. Moran:
Societal vulnerability to computer system failures. Comput. Secur. 5(3): 211-217 (1986) - [j7]Linda S. Rutledge, Lance J. Hoffman:
A survey of issues in computer network security. Comput. Secur. 5(4): 296-308 (1986) - 1982
- [c6]Lance J. Hoffman:
Impacts of information system vulnerabilities on society. AFIPS National Computer Conference 1982: 461-467 - 1980
- [c5]Theodore D. Friedman, Lance J. Hoffman:
Towards a Fail-Safe Approach to Secure Databases. S&P 1980: 18-21
1970 – 1979
- 1979
- [j6]Lance J. Hoffman:
The application of networks in basic computer science and information science research. Inf. Process. Manag. 15(6): 269-280 (1979) - 1978
- [c4]Lance J. Hoffman, Eric H. Michelman, Don Clements:
SECURATE - Security evaluation and analysis using fuzzy metrics. AFIPS National Computer Conference 1978: 531-540 - 1977
- [j5]Lance J. Hoffman:
Privacy laws affecting system design. SIGCAS Comput. Soc. 8(3): 3-6 (1977) - 1974
- [j4]Theodore D. Friedman, Lance J. Hoffman:
Execution Time Requirements for Encipherment Programs. Commun. ACM 17(8): 445-449 (1974) - [j3]Lance J. Hoffman:
Computer security: a course. SIGCAS Comput. Soc. 5(4): 6-8 (1974) - [j2]Lance J. Hoffman:
Course outline for computer security and privacy. ACM SIGCSE Bull. 6(3): 13-17 (1974) - [c3]Franklin G. Woodward, Lance J. Hoffman:
Worst-case costs for dynamic data element security decisions. ACM Annual Conference (2) 1974: 539-544 - [c2]Robert F. Mathis, Stephen R. Crocker, Marvin Denicoff, Victor Mitchell, Frederick W. Weingarten, Edward A. Feustel, Lance J. Hoffman, David K. Hsiao, Rein Turn, William A. Wulf:
Research in data security: policies and projects. AFIPS National Computer Conference 1974: 993-999 - 1971
- [c1]Lance J. Hoffman:
The formulary model for flexible privacy and access controls. AFIPS Fall Joint Computing Conference 1971: 587-601 - 1970
- [b1]Lance J. Hoffman:
The formulary model for access control and privacy in computer systems. Stanford University, USA, 1970
1960 – 1969
- 1969
- [j1]Lance J. Hoffman:
Computers and Privacy: A Survey. ACM Comput. Surv. 1(2): 85-103 (1969)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint