The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
2002 (conf/sec/2002)

  1. O. A. Hoppe, Johan Van Niekerk, Rossouw von Solms
    The Effective Implementation of Information Security in Organizations. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:1-18 [Conf]
  2. Cheryl Vroom, Rossouw von Solms
    A Practical Approach to Information Security Awareness in the Organization. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:19-38 [Conf]
  3. David W. Chadwick, Alexander Otenko
    RBAC Policies in XML for X.509 Based Privilege Management. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:39-54 [Conf]
  4. Aftab Ahmad, Tobias Ruighaver
    A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:55-66 [Conf]
  5. Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos
    Elaborating Quantitative Approaches for IT Security Evaluation. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:67-78 [Conf]
  6. W. J. Brooks, Matthew J. Warren, William Hutchinson
    A Security Evaluation Criteria for Baseline Security Standards. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:79-90 [Conf]
  7. Mikko T. Siponen
    Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:91-108 [Conf]
  8. Maryline Laurent-Maknavicius
    For a Secure Mobile IP and Mobile IPv6 Deployment. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:109-120 [Conf]
  9. A. Alayed, Steven Furnell, I. M. Barlow
    Addressing Internet Security Vulnerabilities: A Benchmarking Study. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:121-132 [Conf]
  10. John Haggerty, Qi Shi, Madjid Merabti
    The Threat From Within -An Analysis of Attacks on anInternal Network. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:133-146 [Conf]
  11. Simeon Xenitellis
    Security Vulnerabilities in Event-Driven Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:147-160 [Conf]
  12. J. J. Yan
    Denial of Service: Another Example. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:161-170 [Conf]
  13. D. Salah, Heba Kamal Aslan, Mahmoud T. El-Hadidi
    A Detection Scheme for the SK Virus. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:171-182 [Conf]
  14. Teemupekka Virtanen, Ronja Addams-Moring
    An Information Security Curriculum in Finland. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:183-190 [Conf]
  15. Thomas Schlienger, Stephanie Teufel
    Information Security Culture: The Socio-Cultural Dimension in Information Security Management. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:191-202 [Conf]
  16. A. Martins, Jan H. P. Eloff
    Information Security Culture. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:203-214 [Conf]
  17. Paul Dowland, Steven Furnell, Maria Papadaki
    Keystroke Analysis as a Method of Advanced User Authentication and Response. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:215-226 [Conf]
  18. Magdi M. S. El-Soudani, H. S. El-Refaey, H. M. Mourad
    Zero Knowledge Broadcasting Identification Scheme. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:227-238 [Conf]
  19. Li-Sha He, Ning Zhang, Li-Rong He
    A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:239-250 [Conf]
  20. Carla Merkle Westphall, Joni da Silva Fraga, Carlos Becker Westphall, S. C. S. Bianchi
    Mandatory Security Policies for CORBA Security Model. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:251-262 [Conf]
  21. Carla Merkle Westphall, Joni da Silva Fraga, Michelle S. Wangham, Rafael R. Obelheiro, Lau Cheuk Lung
    Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:263-274 [Conf]
  22. Marijke Coetzee, Jan H. P. Eloff
    Secure Database Connectivity on the WWW. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:275-286 [Conf]
  23. Reinhardt A. Botha
    Towards Semantic Integrity in Rational Databases. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:287-298 [Conf]
  24. G. Osman, M. G. Darwish, M. Zaki
    Formal Design of Packet Filtering Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:299-310 [Conf]
  25. E. Mohammed, A. Emarah, Kh. El-Shennawy
    Elliptic Curve Cryptosystems on Smart Cards. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:311-322 [Conf]
  26. T. Demuth
    Establishing Bilateral Anonymous Communication in Open Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:323-334 [Conf]
  27. Christer Magnusson, Louise Yngström
    BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:335-346 [Conf]
  28. Theodore Tryfonas, Evangelos A. Kiountouzis
    Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:347-356 [Conf]
  29. R. Abdel-Moneim, S. El-Kassas, H. Hosny
    An Efficient Hybrid Sealed Bid Auction Protocol. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:357-372 [Conf]
  30. Simone Fischer-Hübner, M. Nilsson, Helena Lindskog
    Self-Determination in Mobile Internet: PiMI Prototype Results. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:373-386 [Conf]
  31. Simon N. Foley, Thomas B. Quillinan, John P. Morrison
    Secure Component Distribution Using WebCom. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:387-398 [Conf]
  32. Ryuya Uda, Masahito Ito, Kohei Awaya, Hiroshi Shigeno, Yutaka Matsushita
    E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:399-410 [Conf]
  33. D. Critchlow, Ning Zhang
    An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:411-422 [Conf]
  34. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
    Secure Selective Exclusion in Ad Hoc Wireless Network. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:423-434 [Conf]
  35. S. T. Faraj, F. Al-Naima, S. Y. Ameen
    Optical Network Models for Quantum Cryptography. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:435-452 [Conf]
  36. Panagiotes S. Anastasiades
    A Unified Regulatory Framework on a European Information Society: Suggested Building Levels. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:453-468 [Conf]
  37. L. Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas
    Revisiting Legal and Regulatory Requirements for Secure E-Voting. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:469-480 [Conf]
  38. Meletis A. Belsis, Anthony N. Godwin, Leonid Smalov
    A Security Incident Data Model. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:481-494 [Conf]
  39. A. Meier, Susanne Röhrig
    Security Levels for Contracting Agents. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:495-506 [Conf]
  40. S. Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou
    Functional Requirements for a Secure Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:507-520 [Conf]
  41. M. Hashem, A. Mohamed, M. Wahib
    Intelligent IP Packet Filtering. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:521-535 [Conf]
  42. Mariki M. Eloff, Jan H. P. Eloff
    Human Computer Interaction: An Information Security Perspectives. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:535-546 [Conf]
  43. J. Geneste
    A Very Smart Card for Fighting Against Terrorism. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:547-558 [Conf]
  44. Michael Meier, Niels Bischof, Thomas Holz
    SHEDEL-A Simple Hierarchical Event Description Language for Specifying Attack Signatures. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:559-572 [Conf]
  45. Kenneth Smith, Donald B. Faatz, Amgad Fayad, Sushil Jajodia
    Propagating Modifications to Mobile Policies. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:573-584 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002