Search dblp for Publications

export results for "toc:db/conf/aism/aism2004.bht:"

 download as .bib file

@inproceedings{DBLP:conf/aism/AhmedA04,
  author       = {Sabbir Ahmed and
                  Leisa Armstrong},
  title        = {Securing Web Services with {XML} aware Digital Signatures},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {129--134},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 09:42:27 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/AhmedA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/Ashley04,
  author       = {Paul Ashley},
  title        = {Enforcement of a {P3P} Privacy Policy},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {11--26},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/Ashley04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/Bolan04,
  author       = {Christopher Bolan},
  title        = {Need to Know: Security or Liability?},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {125--128},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/Bolan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/BolanM04,
  author       = {Christopher Bolan and
                  Daniel Mende},
  title        = {Computer Security Research: Approaches and Assumptions},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {115--124},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/BolanM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/BrooksW04,
  author       = {Warren Brooks and
                  Matthew J. Warren},
  title        = {Health Information Security Evaluation: Continued Development of an
                  Object-Oriented Method},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {135--150},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/BrooksW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/DimopoulosFJK04,
  author       = {Vassilis Dimopoulos and
                  Steven Furnell and
                  Murray E. Jennex and
                  Ioannis Kritharas},
  title        = {Approaches to {IT} Security in Small and Medium Enterprises},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {73--82},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aism/DimopoulosFJK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/GokhaleB04,
  author       = {Girish Bhagwan Gokhale and
                  David A. Banks},
  title        = {Organisational Information Security: {A} Viable System Perspective},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {178--184},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/GokhaleB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/HannanT04,
  author       = {Mathew Hannan and
                  Basil Tucker},
  title        = {Risk Management and Organisational Culture: The Implications of Computer
                  Network Attacks and Malware Incidents on Organizational Risk Management},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {167--177},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/HannanT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/JancicW04,
  author       = {A. Jancic and
                  Matthew J. Warren},
  title        = {{PKI} - Advantages and Obstacles},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {104--114},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/JancicW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/Murphy04,
  author       = {G. Murphy},
  title        = {An Examination of the Security of Routing Protocol Updates},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {56--63},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/Murphy04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/Pattinson04,
  author       = {Malcolm R. Pattinson},
  title        = {Risk Homeostasis as a Factor of Information Security},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {64--72},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/Pattinson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/PierceWMW04,
  author       = {Justin D. Pierce and
                  Matthew J. Warren and
                  David R. Mackay and
                  Jason G. Wells},
  title        = {Graphical Authentication: Justifications and Objectives},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {49--63},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/PierceWMW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/SlayQ04,
  author       = {Jill Slay and
                  Gerald Quirchmayr},
  title        = {A Formal Model for the Relationship between Culture and Trust within
                  is Security Management},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {159--166},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/SlayQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/SohV04,
  author       = {Gim Hiong Soh and
                  Timo Vuori},
  title        = {New Form of Identity {(ID)} Theft Crime: Acquiring Personal Information
                  from Your Online Newsletter Providers},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {27--36},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/SohV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/Tan04,
  author       = {C. C. Terence Tan},
  title        = {Developing a framework for understanding Security Governance},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {37--48},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/Tan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/TeradoW04,
  author       = {Emiko Terado and
                  Patricia A. H. Williams},
  title        = {Securing PDAs in the Healthcare Environment},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {4--10},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/TeradoW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/Wolski04,
  author       = {Peter Wolski},
  title        = {{SOHO} Wireless Intrusion Detection Systems - Cure or Placebo},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {151--158},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/Wolski04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/WynneJ04,
  author       = {Michael Wynne and
                  Peter James},
  title        = {Securing Data at Rest},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {94--103},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/WynneJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/Zakaria04,
  author       = {Omar Zakaria},
  title        = {Understanding Challenges of Information Security Culture: {A} Methodological
                  Issue},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {83--93},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/Zakaria04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aism/2004,
  title        = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  isbn         = {0-7298-0572-7},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics