Author of the publication

Security and Privacy Issues for the World Wide Web: Panel Discussion.

, , , , and . DBSec, volume 142 of IFIP Conference Proceedings, page 269-284. Kluwer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alter-egos and Roles: Supporting Workflow Security in Cyberspaces., , , and . DBSec, volume 113 of IFIP Conference Proceedings, page 182-195. Chapman & Hall, (1997)Increasing Firewall Reliability by Recording Routes., and . Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 303-314. Chapman & Hall, (1996)Determining Trigger Involvement During Forensic Attribution in Databases., and . IFIP Int. Conf. Digital Forensics, volume 462 of IFIP Advances in Information and Communication Technology, page 163-177. Springer, (2015)Using Yin's Approach to Case Studies as a Paradigm for Conducting Examinations., and . IFIP Int. Conf. Digital Forensics, volume 462 of IFIP Advances in Information and Communication Technology, page 45-59. Springer, (2015)The role of triggers in database forensics., and . ISSA, page 1-7. IEEE, (2014)Nature and Forensic investigation of crime in Second Life., , and . ISSA, ISSA, Pretoria, South Africa, (2011)Analysing the fairness of trust-based Mobile Ad Hoc Network protocols., and . ISSA, ISSA, Pretoria, South Africa, (2011)Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation., and . ISSA, page 1-14. ISSA, Pretoria, South Africa, (2006)Assembling Metadata for Database Forensics., , and . IFIP Int. Conf. Digital Forensics, volume 361 of IFIP Advances in Information and Communication Technology, page 89-99. Springer, (2011)Active Traffic Capture for Network Forensics., , and . IFIP Int. Conf. Digital Forensics, volume 222 of IFIP Advances in Information and Communication Technology, page 215-228. Springer, (2006)