Dennis Longley

According to our database1, Dennis Longley authored at least 19 papers between 1987 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Evolving a Secure Internet.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security.
Proceedings of the Information Assurance and Security Education and Training, 2013

2010
A Business Continuity Management Simulator.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

2008
Feasibility of Automated Information Security Compliance Auditing.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2006
Security Risk Analysis for Complex Systems.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2005
Developing Threat Networks for Risk Analysis of Information Systems.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

2004
Security Modelling for Risk Analysis.
Proceedings of the Security and Protection in Information Processing Systems, 2004

2003
Electronic Information Security Documentation.
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003

2001
Security Documentation.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

1999
Information security management and modelling.
Inf. Manag. Comput. Secur., 1999

1997
Code of Practice: A Standard for Information Security Management.
Proceedings of the Information Security in Research and Business, 1997

1996
A security officer's workbench.
Comput. Secur., 1996

1994
Effect of key generators on the automatic search for flaws in key management schemes.
Comput. Secur., 1994

Security Modelling for Organisations.
Proceedings of the CCS '94, 1994

1993
Complementarity Attacks and Control Vectors.
IBM Syst. J., 1993

The Risk Data Repository: A Novel Approach to Security Risk Modelling.
Proceedings of the Computer Security, 1993

1992
An automatic search for security flaws in key management schemes.
Comput. Secur., 1992

A Methodology for Describing Information and Physical Security Architectures.
Proceedings of the IT Security: The Need for International Cooperation, 1992

1987
Expert systems applied to the analysis of key management schemes.
Comput. Secur., 1987


  Loading...