Towards Corporate Information Security Education |
A Security Risk Analysis Methodology for Critical Information Infrastructure Protection |
A Framework for Role-based Monitoring of Insider Misuse |
An International Security Perspective |
Highly Qualified Information Security Personnel Training in Russia |
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications |
A Security Model for Anonymous Credential Systems |
Taxonomy of Mixes and Dummy Traffic |
Private Information Storage with Logarithm-Space Secure Hardware |
Identity Management for Self-Portrayal |
Privacy Invasive Software in File-Sharing Tools |
A Risk Driven Approach to Designing Privacy Enhanced Secure |
Infusing Privacy Norms in DRM |
Towards Corporate Information Security Education |
A Security Risk Analysis Methodology for Critical Information Infrastructure Protection |
A Framework for Role-based Monitoring of Insider Misuse |