Reasonable Security by Effective Risk Management Practices: From Theory to Practice. Ghernaouti-Helie, S., Simms, D., & Tashi, I. In Durresi, A., Barolli, L., Enokido, T., Uehara, M., Shakshuki, E. M., & Takizawa, M., editors, NBiS, pages 226-233, 2009. IEEE Computer Society.
Link
Paper bibtex @inproceedings{conf/nbis/Ghernaouti-HelieST09,
added-at = {2023-03-23T00:00:00.000+0100},
author = {Ghernaouti-Helie, Solange and Simms, David and Tashi, Igli},
biburl = {https://www.bibsonomy.org/bibtex/27e03e9c00a657497c5a1a0bcb1eaa224/dblp},
booktitle = {NBiS},
crossref = {conf/nbis/2009},
editor = {Durresi, Arjan and Barolli, Leonard and Enokido, Tomoya and Uehara, Minoru and Shakshuki, Elhadi M. and Takizawa, Makoto},
ee = {https://doi.ieeecomputersociety.org/10.1109/NBiS.2009.66},
interhash = {446065e5d77f7ae276c5f3a8bb42a13e},
intrahash = {7e03e9c00a657497c5a1a0bcb1eaa224},
isbn = {978-0-7695-3767-2},
keywords = {dblp},
pages = {226-233},
publisher = {IEEE Computer Society},
timestamp = {2024-04-10T14:39:06.000+0200},
title = {Reasonable Security by Effective Risk Management Practices: From Theory to Practice.},
url = {http://dblp.uni-trier.de/db/conf/nbis/nbis2009.html#Ghernaouti-HelieST09},
year = 2009
}
Downloads: 0
{"_id":"W9vjtxrrpuD6mq75L","bibbaseid":"ghernaoutihelie-simms-tashi-reasonablesecuritybyeffectiveriskmanagementpracticesfromtheorytopractice-2009","author_short":["Ghernaouti-Helie, S.","Simms, D.","Tashi, I."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2023-03-23T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Ghernaouti-Helie"],"firstnames":["Solange"],"suffixes":[]},{"propositions":[],"lastnames":["Simms"],"firstnames":["David"],"suffixes":[]},{"propositions":[],"lastnames":["Tashi"],"firstnames":["Igli"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/27e03e9c00a657497c5a1a0bcb1eaa224/dblp","booktitle":"NBiS","crossref":"conf/nbis/2009","editor":[{"propositions":[],"lastnames":["Durresi"],"firstnames":["Arjan"],"suffixes":[]},{"propositions":[],"lastnames":["Barolli"],"firstnames":["Leonard"],"suffixes":[]},{"propositions":[],"lastnames":["Enokido"],"firstnames":["Tomoya"],"suffixes":[]},{"propositions":[],"lastnames":["Uehara"],"firstnames":["Minoru"],"suffixes":[]},{"propositions":[],"lastnames":["Shakshuki"],"firstnames":["Elhadi","M."],"suffixes":[]},{"propositions":[],"lastnames":["Takizawa"],"firstnames":["Makoto"],"suffixes":[]}],"ee":"https://doi.ieeecomputersociety.org/10.1109/NBiS.2009.66","interhash":"446065e5d77f7ae276c5f3a8bb42a13e","intrahash":"7e03e9c00a657497c5a1a0bcb1eaa224","isbn":"978-0-7695-3767-2","keywords":"dblp","pages":"226-233","publisher":"IEEE Computer Society","timestamp":"2024-04-10T14:39:06.000+0200","title":"Reasonable Security by Effective Risk Management Practices: From Theory to Practice.","url":"http://dblp.uni-trier.de/db/conf/nbis/nbis2009.html#Ghernaouti-HelieST09","year":"2009","bibtex":"@inproceedings{conf/nbis/Ghernaouti-HelieST09,\n added-at = {2023-03-23T00:00:00.000+0100},\n author = {Ghernaouti-Helie, Solange and Simms, David and Tashi, Igli},\n biburl = {https://www.bibsonomy.org/bibtex/27e03e9c00a657497c5a1a0bcb1eaa224/dblp},\n booktitle = {NBiS},\n crossref = {conf/nbis/2009},\n editor = {Durresi, Arjan and Barolli, Leonard and Enokido, Tomoya and Uehara, Minoru and Shakshuki, Elhadi M. and Takizawa, Makoto},\n ee = {https://doi.ieeecomputersociety.org/10.1109/NBiS.2009.66},\n interhash = {446065e5d77f7ae276c5f3a8bb42a13e},\n intrahash = {7e03e9c00a657497c5a1a0bcb1eaa224},\n isbn = {978-0-7695-3767-2},\n keywords = {dblp},\n pages = {226-233},\n publisher = {IEEE Computer Society},\n timestamp = {2024-04-10T14:39:06.000+0200},\n title = {Reasonable Security by Effective Risk Management Practices: From Theory to Practice.},\n url = {http://dblp.uni-trier.de/db/conf/nbis/nbis2009.html#Ghernaouti-HelieST09},\n year = 2009\n}\n\n","author_short":["Ghernaouti-Helie, S.","Simms, D.","Tashi, I."],"editor_short":["Durresi, A.","Barolli, L.","Enokido, T.","Uehara, M.","Shakshuki, E. M.","Takizawa, M."],"key":"conf/nbis/Ghernaouti-HelieST09","id":"conf/nbis/Ghernaouti-HelieST09","bibbaseid":"ghernaoutihelie-simms-tashi-reasonablesecuritybyeffectiveriskmanagementpracticesfromtheorytopractice-2009","role":"author","urls":{"Link":"https://doi.ieeecomputersociety.org/10.1109/NBiS.2009.66","Paper":"http://dblp.uni-trier.de/db/conf/nbis/nbis2009.html#Ghernaouti-HelieST09"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Simms?items=1000","dataSources":["xFRDJtpGWW7abHeyy"],"keywords":["dblp"],"search_terms":["reasonable","security","effective","risk","management","practices","theory","practice","ghernaouti-helie","simms","tashi"],"title":"Reasonable Security by Effective Risk Management Practices: From Theory to Practice.","year":2009}