LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Sisiaridis, Dimitris; Rossiter, Nick; Heather, Michael (2008)
Languages: English
Types: Unknown
Subjects: G500
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [Asperti and Longo, 1991] Asperti, A. & Longo, G. Categories Types and Structures - An introduction to Category Theory for the working computer scientist, Foundations of Computing Series, M.I.T. Press, 1991
    • [Barr and Wells, 1999] Barr, M. & Wells, C. Category Theory for computing science, International series in computer science, Montreal, Canada, Les Publications Centre de Recherches Mathematiques, 1999
    • [Coles and Moulton, 2003] Coles, S. R. & Moulton, R. Operationalizing IT Risk Management. Computers & Security, 22 (487-493), 2003.
    • [Coulouris et al., 2005] Coulouris, G., Dollimore, J. & Kindberg, T. Distributed Systems: Concepts and Design, Addison-Wesley/Pearson Education, 2005
    • [Doughty, 2003] Doughty, K. Implementing enterprise security: a case study. Information Systems Control Journal, 2 (99-114), 2003.
    • [FIPS, 2003] FIPS Standards for security categorization of federal information and information systems. IN U.S Department of Commerce (Ed.), National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication, 2003.
    • [Gödel, 1930] Gödel, K. Die Vollständigkeit der Axiome des logischen Funktionenkalküls, Monatshefte für Mathematik und Physik, 37 (349-360), 1930. Reprinted in Feferman, S, ed. Gödel Collected Works, volume 1, publications 1929-1936, Oxford, p.102-122 (even numbers) original; p.103-123 (odd numbers) translators Bauer-Mengelberg, Stefan, \& Heijenoort, Jean van (1986).
    • [Hawkins et al., 2000] Hawkins, S., Yen, C. D. & Chou, C. D. Awareness and challenges of Internet security. Information Management & Computer Security, 8 (131-143), 2000.
    • [Heather and Rossiter, 2001] Heather, M. & Rossiter, N. The Anticipatory and Systemic Adjointness of E-Science Computation on the Grid, in Proceedings of Computing Anticipatory Systems, CASYS '01, Liège, Dubois, D. M. (Ed.), 627 (565-574), 2001.
    • [Heather et al., 2008] Heather, M., Rossiter, N. & Sisiaridis, D. The Semantics of Jitter in Anticipating Time Itself within Nano-Technology, in Proceedings of Computing Anticipatory Systems, CASYS '07, Liège, Dubois, D. M. (Ed.), 12pp in press, 2008.
    • [ISO, 2005a] ISO Information Security Management ISO/IEC 17799:2005 Code of Practice. International Organization for Standardization, 2005.
    • [ISO, 2005b] ISO Information Security Management ISO/IEC 27001:2005 Specification. International Organization for Standardization, 2005.
    • [Mac Lane, 1998] Mac Lane, S. Categories for the working mathematician, Graduate Texts in Mathematics, New York, Springer-Verlag, 1998
    • [Moitra and Konda, 2004] Moitra, D. S. & Konda, L. S. An empirical investigation of network attacks on computer systems. Computers & Security, 23 (43-51), 2004.
    • [Reid and Floyd, 2001] Reid, C. R. & Floyd, A. S. Extending the risk analysis model to include market-insurance. Computers & Security, 20 (331-339), 2001.
    • [Rossiter and Heather, 2006] Rossiter, N. & Heather, M. Free and Open Systems Theory, in Proceedings of 18th European Meeting on Cybernetics and Systems Research (EMCSR2006), University of Vienna, Trappl, R. (Ed.), 1 (27-32), 2006.
    • [Rossiter et al., 2007] Rossiter, N., Heather, M. & Nelson, D. A. A Natural Basis for Interoperability, in: Enterprise Interoperability: New Challenges and Approaches, Doumeingts, G, Műller, J, Morel, G, & Vallespir, B, (edd) (417-426) 2007.
    • [Rossiter et al., 2006] Rossiter, N., Heather, M. & Sisiaridis, D. Process as a World Transaction, in Proceedings of Proceedings of ANPA 27, Cambridge University, (36pp), 2006.
    • [Shuey and Spooner, 1997] Shuey, L. & Spooner, L. D. The architecture of Distributed Computer Systems, Addison-Wesley, 1997
    • [Smith and Eloff, 2002] Smith, E. & Eloff, H. P. J. A prototype for assessing information technology risks in Health Care. Computers & Security, 21 (266-284), 2002.
    • [Stallings, 2002] Stallings, W. Cryptography and Network Security: principles and practice, Prentice Hall, 2002
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article