The SCEAS System
Navigation Menu

Conferences in DBLP

Security in Information Systems (sis)
2007 (conf/sis/2007)


  1. Model-Driven Approaches to Security. [Citation Graph (, )][DBLP]


  2. A Key Management Method for Cryptographically Enforced Access Control. [Citation Graph (, )][DBLP]


  3. A Proposal for Extending the Eduroam Infrastructure with Authorization Mechanisms. [Citation Graph (, )][DBLP]


  4. A New Way to Think About Secure Computation: Language-based Secure Computation. [Citation Graph (, )][DBLP]


  5. RoboAdmin: A Different Approach to Remote System Administration. [Citation Graph (, )][DBLP]


  6. A Reputation System for Electronic Negotiations. [Citation Graph (, )][DBLP]


  7. A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. [Citation Graph (, )][DBLP]


  8. Research on Counter Http DDoS Attacks based on Weighted Queue Random Early Drop . [Citation Graph (, )][DBLP]


  9. Comparison of IPsec to TLS and SRTP for Securing VoIP. [Citation Graph (, )][DBLP]


  10. Security in TciNMP Systems. [Citation Graph (, )][DBLP]


  11. Confining the Insider Threat in Mass Virtual Hosting Systems. [Citation Graph (, )][DBLP]


  12. A General Approach to Securely Querying XML. [Citation Graph (, )][DBLP]


  13. New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. [Citation Graph (, )][DBLP]


  14. On the Relationship between Confidentiality Measures: Entropy and Guesswork. [Citation Graph (, )][DBLP]


  15. A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  16. A Three Layered Model to Implement Data Privacy Policies. [Citation Graph (, )][DBLP]


  17. Implementing Mobile DRM with MPEG 21 and OMA. [Citation Graph (, )][DBLP]


  18. Inferring Secret Information in Relational Databases. [Citation Graph (, )][DBLP]


  19. A DRM Architecture for Securing User Privacy by Design. [Citation Graph (, )][DBLP]


  20. An Ontology for the Expression of Intellectual Property Entities and Relations. [Citation Graph (, )][DBLP]


  21. Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA Approach. [Citation Graph (, )][DBLP]


  22. SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines. [Citation Graph (, )][DBLP]


  23. MMISS-SME Practical Development: Maturity Model for Information Systems Security Management in SMEs. [Citation Graph (, )][DBLP]


  24. SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002