Author:
Paul Prantosh,Aithal P. S.
Reference23 articles.
1. Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques;M Aslam;Proceedings of the 6th International Conference on Security of Information and Networks,2013
2. Open data, privacy, and fair information principles: Towards a balancing framework;F Z Borgesius;Berkeley Technology Law Journal,2015
3. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness;B Bulgurcu;MIS quarterly,2010
4. NIST and computer security;W Burr;IT Professional,2013