|
Conferences in DBLP
Model-Driven Approaches to Security. [Citation Graph (, )][DBLP]
A Key Management Method for Cryptographically Enforced Access Control. [Citation Graph (, )][DBLP]
A Proposal for Extending the Eduroam Infrastructure with Authorization Mechanisms. [Citation Graph (, )][DBLP]
A New Way to Think About Secure Computation: Language-based Secure Computation. [Citation Graph (, )][DBLP]
RoboAdmin: A Different Approach to Remote System Administration. [Citation Graph (, )][DBLP]
A Reputation System for Electronic Negotiations. [Citation Graph (, )][DBLP]
A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. [Citation Graph (, )][DBLP]
Research on Counter Http DDoS Attacks based on Weighted Queue Random Early Drop . [Citation Graph (, )][DBLP]
Comparison of IPsec to TLS and SRTP for Securing VoIP. [Citation Graph (, )][DBLP]
Security in TciNMP Systems. [Citation Graph (, )][DBLP]
Confining the Insider Threat in Mass Virtual Hosting Systems. [Citation Graph (, )][DBLP]
A General Approach to Securely Querying XML. [Citation Graph (, )][DBLP]
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. [Citation Graph (, )][DBLP]
On the Relationship between Confidentiality Measures: Entropy and Guesswork. [Citation Graph (, )][DBLP]
A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]
A Three Layered Model to Implement Data Privacy Policies. [Citation Graph (, )][DBLP]
Implementing Mobile DRM with MPEG 21 and OMA. [Citation Graph (, )][DBLP]
Inferring Secret Information in Relational Databases. [Citation Graph (, )][DBLP]
A DRM Architecture for Securing User Privacy by Design. [Citation Graph (, )][DBLP]
An Ontology for the Expression of Intellectual Property Entities and Relations. [Citation Graph (, )][DBLP]
Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA Approach. [Citation Graph (, )][DBLP]
SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines. [Citation Graph (, )][DBLP]
MMISS-SME Practical Development: Maturity Model for Information Systems Security Management in SMEs. [Citation Graph (, )][DBLP]
SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level. [Citation Graph (, )][DBLP]
|