Conferences in DBLP
Maurizio Talamo Introduction - E-Government Services: Certification and Securit. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:5-13 [Conf ] Raouf Boutaba , Brent Ishibashi , Basem Shihada A Network Management Viewpoint on Security in e-Services. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:17-45 [Conf ] Ian T. Foster , Frank Siebenlist , Steven Tuecke , Von Welch Security and Certification Issues in Grid Computing. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:47-55 [Conf ] Arun Iyengar , Ronald Mraz , Mary Ellen Zurko Performance Considerations in Web Security. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:57-71 [Conf ] Richard E. Schantz , Franklin Webber , Partha Pratim Pal , Joseph P. Loyall , Douglas C. Schmidt Protecting Applications Against Malice Using AdaptiveMiddleware. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:73-108 [Conf ] Fabio Di Vito , Paola Inverardi , Giovanna Melideo A Context-Aware Approach to Infer Trust in Public Key Infrastructures. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:111-125 [Conf ] Guido Marinelli , Paolo Russo Mountain Information System: A Distributed E-Government Office. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:127-138 [Conf ] Franco Arcieri , Roberto Giaccio E-Government Services: Certification and Security Overlay. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:139-148 [Conf ] Oleksiy Mazhelis , Alexandr Seleznyov , Seppo Puuronen A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:149-164 [Conf ] Hakan Hacigümüs , Balakrishna R. Iyer , Sharad Mehrotra Encrypted Database Integrity in Database Service Provider Model. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:165-174 [Conf ] Igor Balabine , Arne Koschel Deploying Multi-tier Applications Across Multiple Security Domains. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:177-182 [Conf ] Bertrand Marquet , Adrian Rossi , François J. N. Cosquer Security Through Integration: Towards a Comprehensive Framework for Development and Certification. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:183-188 [Conf ] David T. Shaw , Stanislaw P. Maj Multiple Applications with a Single Smart Card. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:189-193 [Conf ] Jennifer Stoddart Respecting Privacy in E-Government. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:201-210 [Conf ] John J. Borking The Status of Privacy Enhancing Technologies. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:211-246 [Conf ] Kathleen Tolan Initiatives in the Fight Against Cyber Terrorism. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:247-265 [Conf ] Reinhard Posch , Herbert Leitold Identification and Confidentiality for e-Government. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:267-279 [Conf ] Étínne Dubreuil Mastering E-Commerce and Globalization. [Citation Graph (0, 0)][DBLP ] Certification and Security in E-Services, 2002, pp:281-291 [Conf ]