Author: Glenn B. Dietrich
Publications
Co-authors
Productive Colleagues
Publications
Conklin, Art, Dietrich, Glenn B., Walz, Diane B. (2004): Password-Based Authentication: A System Perspective. In: HICSS 2004 , 2004, . https://csdl.computer.org/comp/proceedings/hicss/2004/2056/07/205670170babs.htm
Dietrich, Glenn B., Shipley, Marcus B. (1999): Technology Strategies in a Complex Environment. In: HICSS 1999 , 1999, . https://csdl.computer.org/comp/proceedings/hicss/1999/0001/07/00017058abs.htm
White, Gregory B., Dietrich, Glenn B., Goles, Tim (2004): Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respon. In: HICSS 2004 , 2004, . https://csdl.computer.org/comp/proceedings/hicss/2004/2056/07/205670170aabs.htm
Conklin, Wm. Arthur, Dietrich, Glenn B. (2007): Secure Software Engineering: A New Paradigm. In: HICSS 2007 - 40th Hawaii International International Conference on Systems Science 3-6 January, 2007, Waikoloa, Big Island, HI, USA. pp. 272. https://doi.ieeecomputersociety.org/10.1109/HICSS.2007.477
Conklin, Wm. Arthur, Dietrich, Glenn B. (2008): Systems Theory Model for Information Security. In: HICSS 2008 - 41st Hawaii International International Conference on Systems Science 7-10 January, 2008, Waikoloa, Big Island, HI, USA. pp. 265. https://doi.ieeecomputersociety.org/10.1109/HICSS.2008.421