Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers | 5 | 0.69 | 2013 |
Security Policy Alignment: A Formal Approach | 11 | 0.88 | 2013 |
Training students to steal: a practical assignment in computer security education | 6 | 0.47 | 2011 |
Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. | 1 | 0.40 | 2011 |
Two methodologies for physical penetration testing using social engineering | 19 | 1.24 | 2010 |
Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations. | 5 | 0.60 | 2010 |
Portunes: representing attack scenarios spanning through the physical, digital and social domain | 22 | 1.18 | 2010 |
Laptop theft: a case study on the effectiveness of security mechanisms in open organizations | 3 | 0.43 | 2010 |
On the inability of existing security models to cope with data mobility in dynamic organizations | 1 | 0.38 | 2008 |