Skip to primary content
Skip to secondary content
ConsortiumInfo.org
Search
Sponsored by Gesmer Updegrove
  • Blog
  • About
  • Guide
  • SSO List
  • Meta Library
  • Journal
meta library

Security

Filter List
Sort List
Standards, Usable Security, and Accessibility:Can we constrain the problem any further?
Mary Ellen Zurko and Kenny Johar
8/13/2008
Study on Interoperability at Local and Regional Level
Konstantinos Tarabanis
8/29/2008
The Benefits of Standard IT Governance Frameworks
George Spafford
11/17/2008
The Emerging Standards War in Cyberspace Security
John W. Bagby
6/13/2008
The Linux Kernel and the Forensic Acquisition of Hard Disks with an Odd Number of Sectors
Jesse Kornblum
10/27/2008
The Next Big Election Challenge: Developing Electronic Data Transaction Standards for Election Administration
Michael Alvarez and Thad E. Hall
6/08/2008
Toward Standardization in Privacy-Preserving Data Mining
Stanley R. M. Oliveira and Osmar R. Zaïane
3/21/2008
Validation, Verification and Certification of Embedded Systems
Dan Craigen, Natalia Juristo, Jacques Cazin, Ernst Kesseler and Robin Bloomfield
11/24/2009
  1. «
  2. 1
  3. 2
  4. 3
  5. 4

Post navigation

Newer posts →

Search Site

Newsletter Signup Form

Subscribe to
the standards blog
Gesmer Updegrove
  • Terms of Use and Privacy Policy
  • Contact
  • Sitemap