Search dblp for Publications

export results for "toc:db/journals/isjgp/isjgp13.bht:"

 download as .bib file

@article{DBLP:journals/isjgp/Drew05,
  author       = {Steven Drew},
  title        = {Reducing Enterprise Risk with Effective Threat Management},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {6},
  pages        = {37--42},
  year         = {2005},
  url          = {https://doi.org/10.1201/1086/44954.13.6.20050101/86219.6},
  doi          = {10.1201/1086/44954.13.6.20050101/86219.6},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Drew05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Dunham05,
  author       = {Ken Dunham},
  title        = {The Power of Intelligence},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {6},
  pages        = {10--14},
  year         = {2005},
  url          = {https://doi.org/10.1201/1086/44954.13.6.20050101/86216.3},
  doi          = {10.1201/1086/44954.13.6.20050101/86216.3},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Dunham05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Freeman05,
  author       = {Edward H. Freeman},
  title        = {Data Protection and the Commerce Clause},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {6},
  pages        = {5--9},
  year         = {2005},
  url          = {https://doi.org/10.1201/1086/44954.13.6.20050101/86215.2},
  doi          = {10.1201/1086/44954.13.6.20050101/86215.2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Freeman05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Hormozi05,
  author       = {Amir M. Hormozi},
  title        = {Cookies and Privacy},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {6},
  pages        = {51--59},
  year         = {2005},
  url          = {https://doi.org/10.1201/1086/44954.13.6.20050101/86221.8},
  doi          = {10.1201/1086/44954.13.6.20050101/86221.8},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Hormozi05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Master05,
  author       = {Adarbad Master},
  title        = {Digital Identities Can Tame the Wild, Wild Web},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {6},
  pages        = {15--22},
  year         = {2005},
  url          = {https://doi.org/10.1201/1086/44954.13.6.20050101/86217.4},
  doi          = {10.1201/1086/44954.13.6.20050101/86217.4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Master05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/OHanley05,
  author       = {Richard O'Hanley},
  title        = {Spyware, Adware, Malware - It's All Sleazeware to Me},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {6},
  pages        = {2--4},
  year         = {2005},
  url          = {https://doi.org/10.1201/1086/44954.13.6.20050101/86214.1},
  doi          = {10.1201/1086/44954.13.6.20050101/86214.1},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/OHanley05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/TinsethR05,
  author       = {Andrew Tinseth and
                  Dan Richlin},
  title        = {{SB1386:} One Year Later},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {6},
  pages        = {43--50},
  year         = {2005},
  url          = {https://doi.org/10.1201/1086/44954.13.6.20050101/86220.7},
  doi          = {10.1201/1086/44954.13.6.20050101/86220.7},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/TinsethR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/TrabelsiR05,
  author       = {Zouheir Trabelsi and
                  Hamza Rahmani},
  title        = {An Anti-Sniffer Based on {ARP} Cache Poisoning Attack},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {6},
  pages        = {23--36},
  year         = {2005},
  url          = {https://doi.org/10.1201/1086/44954.13.6.20050101/86218.5},
  doi          = {10.1201/1086/44954.13.6.20050101/86218.5},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/TrabelsiR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Akerman04,
  author       = {Nick Akerman},
  title        = {Protecting Yourself While Protecting Your Computer Data: Two Laws
                  Make It More Important than Ever},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {1},
  pages        = {12--17},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44119.13.1.20040301/80430.3},
  doi          = {10.1201/1086/44119.13.1.20040301/80430.3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Akerman04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BeachamM04,
  author       = {Alyson E. Beacham and
                  Denise Johnson McManus},
  title        = {Recovery of Financial Services Firms in the World Trade Center, Post
                  9/11/01},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {2},
  pages        = {46--55},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44312.13.2.20040501/81652.7},
  doi          = {10.1201/1086/44312.13.2.20040501/81652.7},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/BeachamM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BreuBHP04,
  author       = {Ruth Breu and
                  Klaus Burger and
                  Michael Hafner and
                  Gerhard Popp},
  title        = {Towards a Systematic Development of Secure Systems},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {3},
  pages        = {5--13},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44530.13.3.20040701/83064.2},
  doi          = {10.1201/1086/44530.13.3.20040701/83064.2},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/BreuBHP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BrinkmanFDHJ04,
  author       = {Richard Brinkman and
                  Ling Feng and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Willem Jonker},
  title        = {Efficient Tree Search in Encrypted Data},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {3},
  pages        = {14--21},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44530.13.3.20040701/83065.3},
  doi          = {10.1201/1086/44530.13.3.20040701/83065.3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/BrinkmanFDHJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Chuvakin04a,
  author       = {Anton Chuvakin},
  title        = {Security Event Analysis through Correlation},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {2},
  pages        = {13--18},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44312.13.2.20040501/81648.3},
  doi          = {10.1201/1086/44312.13.2.20040501/81648.3},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Chuvakin04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Conorich04,
  author       = {Douglas G. Conorich},
  title        = {Monitoring Intrusion Detection Systems: From Data to Knowledge},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {2},
  pages        = {19--30},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44312.13.2.20040501/81649.4},
  doi          = {10.1201/1086/44312.13.2.20040501/81649.4},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Conorich04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Dunham04a,
  author       = {Ken Dunham},
  title        = {Why SoBig Is So Big},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {1},
  pages        = {2--7},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44119.13.1.20040301/80428.1},
  doi          = {10.1201/1086/44119.13.1.20040301/80428.1},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Dunham04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Dunham04b,
  author       = {Ken Dunham},
  title        = {Phishing Isn't So Sophisticated: Scary!},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {2},
  pages        = {2--7},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44312.13.2.20040501/81646.1},
  doi          = {10.1201/1086/44312.13.2.20040501/81646.1},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Dunham04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Dunham04c,
  author       = {Ken Dunham},
  title        = {Mydoom Miseries},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {4},
  pages        = {2--5},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44640.13.4.20040901/83726.1},
  doi          = {10.1201/1086/44640.13.4.20040901/83726.1},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Dunham04c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Ferson04,
  author       = {Patricia Ferson},
  title        = {I'll Take an Order of Data Sensitivity with Some Integrity on the
                  Side: Finding a Balance within Access Control Models},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {4},
  pages        = {22--25},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44640.13.4.20040901/83729.4},
  doi          = {10.1201/1086/44640.13.4.20040901/83729.4},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Ferson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Freeman04a,
  author       = {Edward H. Freeman},
  title        = {Source Code Escrow},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {1},
  pages        = {8--11},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44119.13.1.20040301/80429.2},
  doi          = {10.1201/1086/44119.13.1.20040301/80429.2},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Freeman04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Freeman04b,
  author       = {Edward H. Freeman},
  title        = {Digital Signatures and Electronic Contracts},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {2},
  pages        = {8--12},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44312.13.2.20040501/81647.2},
  doi          = {10.1201/1086/44312.13.2.20040501/81647.2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Freeman04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Freeman04c,
  author       = {Edward H. Freeman},
  title        = {Corporate Liability for Illegal Downloading of Copyrighted Music},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {4},
  pages        = {6--10},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44640.13.4.20040901/83727.2},
  doi          = {10.1201/1086/44640.13.4.20040901/83727.2},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Freeman04c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Freeman04d,
  author       = {Edward H. Freeman},
  title        = {Document Theft: Appropriate Responses},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {5},
  pages        = {4--8},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44797.13.5.20041101/84904.2},
  doi          = {10.1201/1086/44797.13.5.20041101/84904.2},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Freeman04d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Geffert04,
  author       = {Brian T. Geffert},
  title        = {Incorporating {HIPAA} Security Requirements into an Enterprise Security
                  Program},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {5},
  pages        = {21--28},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44797.13.5.20041101/84906.4},
  doi          = {10.1201/1086/44797.13.5.20041101/84906.4},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Geffert04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Ghosh04,
  author       = {Sumit Ghosh},
  title        = {The Nature of Cyber-attacks in the Future: {A} Position Paper},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {1},
  pages        = {18--33},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44119.13.1.20040301/80431.4},
  doi          = {10.1201/1086/44119.13.1.20040301/80431.4},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Ghosh04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GutierrezFP04,
  author       = {Carlos Guti{\'{e}}rrez and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Mario Piattini},
  title        = {Web Services Security: Is the Problem Solved?},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {3},
  pages        = {22--31},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44530.13.3.20040701/83066.4},
  doi          = {10.1201/1086/44530.13.3.20040701/83066.4},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/GutierrezFP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Hernandez-GoyaC04,
  author       = {Candelaria Hern{\'{a}}ndez{-}Goya and
                  Pino Caballero{-}Gil},
  title        = {A New Role of Graph Theory: The Design of Probably Secure Cryptoprotocols},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {1},
  pages        = {34--43},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44119.13.1.20040301/80432.5},
  doi          = {10.1201/1086/44119.13.1.20040301/80432.5},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Hernandez-GoyaC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/HovavD04,
  author       = {Anat Hovav and
                  John D'Arcy},
  title        = {The Impact of Virus Attack Announcements on the Market Value of Firms},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {3},
  pages        = {32--40},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44530.13.3.20040701/83067.5},
  doi          = {10.1201/1086/44530.13.3.20040701/83067.5},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/HovavD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/JonesR04,
  author       = {Russell L. Jones and
                  Abhinav Rastogi},
  title        = {Secure Coding: Building Security into the Software Development Life
                  Cycle},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {5},
  pages        = {29--39},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44797.13.5.20041101/84907.5},
  doi          = {10.1201/1086/44797.13.5.20041101/84907.5},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/JonesR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Main04,
  author       = {Alec Main},
  title        = {Application Security: Building in Security during the Development
                  Stage},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {2},
  pages        = {31--37},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44312.13.2.20040501/81650.5},
  doi          = {10.1201/1086/44312.13.2.20040501/81650.5},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Main04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Mehta04,
  author       = {Raju Mehta},
  title        = {Oracle Database Security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {5},
  pages        = {40--52},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44797.13.5.20041101/84908.6},
  doi          = {10.1201/1086/44797.13.5.20041101/84908.6},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Mehta04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MunozCCG04,
  author       = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Jes{\'{u}}s Carretero and
                  F{\'{e}}lix Garc{\'{\i}}a},
  title        = {Filtering Spam at E-Mail Server Level with Improved {CRM114}},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {3},
  pages        = {48--55},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44530.13.3.20040701/83069.7},
  doi          = {10.1201/1086/44530.13.3.20040701/83069.7},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/MunozCCG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Nemzow04,
  author       = {Martin Nemzow},
  title        = {Creating and Implementing {MS} Office Security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {4},
  pages        = {26--38},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44640.13.4.20040901/83730.5},
  doi          = {10.1201/1086/44640.13.4.20040901/83730.5},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Nemzow04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/OHanley04,
  author       = {Richard O'Hanley},
  title        = {Maintaining Security and Privacy Requires Getting "Back to Basics"},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {5},
  pages        = {2--3},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44797.13.5.20041101/84903.1},
  doi          = {10.1201/1086/44797.13.5.20041101/84903.1},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/OHanley04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Peltier04,
  author       = {Thomas R. Peltier},
  title        = {Developing an Enterprisewide Policy Structure},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {1},
  pages        = {44--50},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44119.13.1.20040301/80433.6},
  doi          = {10.1201/1086/44119.13.1.20040301/80433.6},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Peltier04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Peltier04a,
  author       = {Thomas R. Peltier},
  title        = {Risk Analysis and Risk Management},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {4},
  pages        = {44--56},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44640.13.4.20040901/83732.7},
  doi          = {10.1201/1086/44640.13.4.20040901/83732.7},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Peltier04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Saunier04,
  author       = {Louisa Saunier},
  title        = {The Twelve Principles of Trusted Solutions},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {2},
  pages        = {38--45},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44312.13.2.20040501/81651.6},
  doi          = {10.1201/1086/44312.13.2.20040501/81651.6},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Saunier04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Stephenson04,
  author       = {Peter Stephenson},
  title        = {Forensic Analysis of Risks in Enterprise Systems},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {4},
  pages        = {11--21},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44640.13.4.20040901/83728.3},
  doi          = {10.1201/1086/44640.13.4.20040901/83728.3},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Stephenson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ThomasE04,
  author       = {J. Thomas and
                  Adam J. Elbirt},
  title        = {Understanding Internet Protocol Security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {4},
  pages        = {39--43},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44640.13.4.20040901/83731.6},
  doi          = {10.1201/1086/44640.13.4.20040901/83731.6},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/ThomasE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Wolf04,
  author       = {Laurence J. Wolf},
  title        = {Preventing Failure: The Value of Performing a Single Point of Failure
                  Analysis for Critical Applications and Systems},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {1},
  pages        = {51--54},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44119.13.1.20040301/80434.7},
  doi          = {10.1201/1086/44119.13.1.20040301/80434.7},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Wolf04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Wolf04a,
  author       = {Laurence J. Wolf},
  title        = {Can You Handle the Headaches? Analyzing and Optimizing the Effectiveness
                  of the Incident Management Process},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {5},
  pages        = {9--20},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44797.13.5.20041101/84905.3},
  doi          = {10.1201/1086/44797.13.5.20041101/84905.3},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Wolf04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ZhaoVB04,
  author       = {Weiliang Zhao and
                  Vijay Varadharajan and
                  George Bryan},
  title        = {Fair Trading Protocol with Offline Anonymous Credit Card Payment},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {13},
  number       = {3},
  pages        = {41--47},
  year         = {2004},
  url          = {https://doi.org/10.1201/1086/44530.13.3.20040701/83068.6},
  doi          = {10.1201/1086/44530.13.3.20040701/83068.6},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/ZhaoVB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics