William Hugh Murray

According to our database1, William Hugh Murray authored at least 24 papers between 1982 and 2011.

Collaborative distances:
  • no known Dijkstra number2.
  • no known Erdős number3.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
XML and Other Metadata Languages.
Proceedings of the Encyclopedia of Information Assurance, 2011

System Design Flaws.
Proceedings of the Encyclopedia of Information Assurance, 2011

Ownership and Custody of Data.
Proceedings of the Encyclopedia of Information Assurance, 2011

Instant Messaging.
Proceedings of the Encyclopedia of Information Assurance, 2011

Database Integrity.
Proceedings of the Encyclopedia of Information Assurance, 2011

Cryptography: Key Management: Functions and Principles.
Proceedings of the Encyclopedia of Information Assurance, 2011

Communication Protocols and Services.
Proceedings of the Encyclopedia of Information Assurance, 2011

2010
Cheating in Computer Science.
Ubiquity, 2010

2007
Enterprise Security Architecture.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Reflections on Database Integrity.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Security for XML and Other Metadata Languages.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Instant Messaging Security Issues.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Security of Communication Protocols and Services.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Common System Design Flaws and Security Issues.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Principles and Applications of Cryptographic Key Management.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Ownership and Custody of Data.
Proceedings of the Information security management handbook, Sixth Edition., 2007

1998
Enterprise Security Architecture.
Inf. Secur. J. A Glob. Perspect., 1998

1995
Modern Cryptography.
Inf. Secur. J. A Glob. Perspect., 1995

1994
Five Views of the Common Body of Knowledge.
Inf. Secur. J. A Glob. Perspect., 1994

1993
Surveys of Information Security.
Inf. Secur. J. A Glob. Perspect., 1993

1988
The application of epidemiology to computer viruses.
Comput. Secur., 1988

1984
Security Considerations for Personal Computers.
IBM Syst. J., 1984

1983
Computer security: Observations on the state of the technology.
Comput. Secur., 1983

1982
Security procedures for program libraries.
Comput. Secur., 1982


  Loading...