The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP TC11 Publications (ifip11)
2002 (conf/ifip11/2002)

  1. Maurizio Talamo
    Introduction - E-Government Services: Certification and Securit. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:5-13 [Conf]
  2. Raouf Boutaba, Brent Ishibashi, Basem Shihada
    A Network Management Viewpoint on Security in e-Services. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:17-45 [Conf]
  3. Ian T. Foster, Frank Siebenlist, Steven Tuecke, Von Welch
    Security and Certification Issues in Grid Computing. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:47-55 [Conf]
  4. Arun Iyengar, Ronald Mraz, Mary Ellen Zurko
    Performance Considerations in Web Security. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:57-71 [Conf]
  5. Richard E. Schantz, Franklin Webber, Partha Pratim Pal, Joseph P. Loyall, Douglas C. Schmidt
    Protecting Applications Against Malice Using AdaptiveMiddleware. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:73-108 [Conf]
  6. Fabio Di Vito, Paola Inverardi, Giovanna Melideo
    A Context-Aware Approach to Infer Trust in Public Key Infrastructures. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:111-125 [Conf]
  7. Guido Marinelli, Paolo Russo
    Mountain Information System: A Distributed E-Government Office. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:127-138 [Conf]
  8. Franco Arcieri, Roberto Giaccio
    E-Government Services: Certification and Security Overlay. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:139-148 [Conf]
  9. Oleksiy Mazhelis, Alexandr Seleznyov, Seppo Puuronen
    A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:149-164 [Conf]
  10. Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra
    Encrypted Database Integrity in Database Service Provider Model. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:165-174 [Conf]
  11. Igor Balabine, Arne Koschel
    Deploying Multi-tier Applications Across Multiple Security Domains. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:177-182 [Conf]
  12. Bertrand Marquet, Adrian Rossi, François J. N. Cosquer
    Security Through Integration: Towards a Comprehensive Framework for Development and Certification. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:183-188 [Conf]
  13. David T. Shaw, Stanislaw P. Maj
    Multiple Applications with a Single Smart Card. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:189-193 [Conf]
  14. Jennifer Stoddart
    Respecting Privacy in E-Government. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:201-210 [Conf]
  15. John J. Borking
    The Status of Privacy Enhancing Technologies. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:211-246 [Conf]
  16. Kathleen Tolan
    Initiatives in the Fight Against Cyber Terrorism. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:247-265 [Conf]
  17. Reinhard Posch, Herbert Leitold
    Identification and Confidentiality for e-Government. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:267-279 [Conf]
  18. Étínne Dubreuil
    Mastering E-Commerce and Globalization. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:281-291 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002