The SCEAS System
Navigation Menu

Conferences in DBLP

Security in Information Systems (sis)
2008 (conf/sis/2008)

  1. Process Modeling for Privacy - Conformant Biobanking: Case Studies on Modeling in UMLsec. [Citation Graph (, )][DBLP]

  2. Integrating Privacy Policies into Business Processes. [Citation Graph (, )][DBLP]

  3. Network Access Control Interoperation using Semantic Web Techniques. [Citation Graph (, )][DBLP]

  4. Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT. [Citation Graph (, )][DBLP]

  5. An Access Control Model for Location based Services. [Citation Graph (, )][DBLP]

  6. New Attack Strategy for the Shrinking Generator. [Citation Graph (, )][DBLP]

  7. Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes. [Citation Graph (, )][DBLP]

  8. An Ontology-Based Framework for Modelling Security Requirements. [Citation Graph (, )][DBLP]

  9. A Multi-Dimensional Classification for Users of Security Patterns. [Citation Graph (, )][DBLP]

  10. Knowledge Extraction and Management for Insider Threat Mitigation. [Citation Graph (, )][DBLP]

  11. Conceptual Design of a Method to Support IS Security Investment Decisions within the Context of Critical Business Processes. [Citation Graph (, )][DBLP]

  12. Adaptive Filtering of Comment Spam in Multi-user Forums and Blogs. [Citation Graph (, )][DBLP]

  13. Trust-Aware Anonymous and Efficient Routing for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]

  14. Firewall Rule Set Inconsistency Characterization by Clustering. [Citation Graph (, )][DBLP]

  15. Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. [Citation Graph (, )][DBLP]

  16. Effectiveness of Trust Reasoning for Attack Detection in OLSR. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002