Lance J. Hoffman

According to our database1, Lance J. Hoffman authored at least 40 papers between 1969 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

ACM Fellow

ACM Fellow 1995, "Research and social impact of computing and facilitation of dialogue among concerned stakeholders, exemplified by institutionalizing within ACM the Conference on Computers, Freedom, and Privacy.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Reach to Teach: Preparing Cybersecurity Experts as Adjunct Community College Faculty.
Proceedings of the 11th International Conference on Computer Supported Education, 2019

2012
Holistically Building the Cybersecurity Workforce.
IEEE Secur. Priv., 2012

Cybersecurity Workforce Development Directions.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

2009
An exploration of the current state of information assurance education.
ACM SIGCSE Bull., 2009

2006
Taking the network on the road: Portable network solutions for computer security educators.
ACM J. Educ. Resour. Comput., 2006

Taking Networks on the Road: Portable Solutions for Security Educators.
IEEE Secur. Priv., 2006

Trust beyond security: an expanded trust model.
Commun. ACM, 2006

2005
Exploring a National Cybersecurity Exercise for Universities.
IEEE Secur. Priv., 2005

2004
Challenges of intervehicle ad hoc networks.
IEEE Trans. Intell. Transp. Syst., 2004

2003
The Portable Educational Network (PEN).
Proceedings of the IEEE Systems, 2003

2002
Motivations behind a role play at CFP: repeated assaults on the constitution by extremist property rights advocates.
Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002

2001
Internet voting for public officials: introduction.
Commun. ACM, 2001

2000
Internet voting: will it spur or corrupt democracy?
Proceedings of the Tenth Conference on Computers, 2000

1999
Teaching E-Commerce to a Multidisciplinary Class.
Commun. ACM, 1999

1994
Cryptography Policy.
Commun. ACM, 1994

BITS: A Smartcard Protected Operating System.
Commun. ACM, 1994

1993
Bugging the Digital Network.
Inf. Secur. J. A Glob. Perspect., 1993

A shortest path network security model.
Comput. Secur., 1993

On the shortest path to network security.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
Reducing Society's Vulnerability as Computers and Networks Proliferate.
Proceedings of the Education and Society, 1992

1991
Imminent policy considerations in the design and management of national and international computer networks.
IEEE Commun. Mag., 1991

1990
Security pipeline interface (SPI).
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

CERTS: a comparative evaluation method for risk management methodologies and tools.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
Smoking out the bad actors: Risk analysis in the age of the microcomputer.
Comput. Secur., 1989

Risk analysis and computer security: Towards a theory at last.
Comput. Secur., 1989

1986
A survey of issues in computer network security.
Comput. Secur., 1986

Societal vulnerability to computer system failures.
Comput. Secur., 1986

1982
Impacts of information system vulnerabilities on society.
Proceedings of the American Federation of Information Processing Societies: 1982 National Computer Conference, 1982

1980
Towards a Fail-Safe Approach to Secure Databases.
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980

1979
The application of networks in basic computer science and information science research.
Inf. Process. Manag., 1979

1978
SECURATE - Security evaluation and analysis using fuzzy metrics.
Proceedings of the American Federation of Information Processing Societies: 1978 National Computer Conference, 1978

1977
Privacy laws affecting system design.
SIGCAS Comput. Soc., 1977

1974
Course outline for computer security and privacy.
ACM SIGCSE Bull., 1974

Computer security: a course.
SIGCAS Comput. Soc., 1974

Execution Time Requirements for Encipherment Programs.
Commun. ACM, 1974

Research in data security: policies and projects.
Proceedings of the American Federation of Information Processing Societies: 1974 National Computer Conference, 1974

Worst-case costs for dynamic data element security decisions.
Proceedings of the 1974 ACM Annual Conference, 1974

1971
The formulary model for flexible privacy and access controls.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '71 Fall Joint Computer Conference, 1971

1970
The formulary model for access control and privacy in computer systems.
PhD thesis, 1970

1969
Computers and Privacy: A Survey.
ACM Comput. Surv., 1969


  Loading...