|
Conferences in DBLP
- O. A. Hoppe, Johan Van Niekerk, Rossouw von Solms
The Effective Implementation of Information Security in Organizations. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:1-18 [Conf]
- Cheryl Vroom, Rossouw von Solms
A Practical Approach to Information Security Awareness in the Organization. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:19-38 [Conf]
- David W. Chadwick, Alexander Otenko
RBAC Policies in XML for X.509 Based Privilege Management. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:39-54 [Conf]
- Aftab Ahmad, Tobias Ruighaver
A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:55-66 [Conf]
- Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos
Elaborating Quantitative Approaches for IT Security Evaluation. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:67-78 [Conf]
- W. J. Brooks, Matthew J. Warren, William Hutchinson
A Security Evaluation Criteria for Baseline Security Standards. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:79-90 [Conf]
- Mikko T. Siponen
Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:91-108 [Conf]
- Maryline Laurent-Maknavicius
For a Secure Mobile IP and Mobile IPv6 Deployment. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:109-120 [Conf]
- A. Alayed, Steven Furnell, I. M. Barlow
Addressing Internet Security Vulnerabilities: A Benchmarking Study. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:121-132 [Conf]
- John Haggerty, Qi Shi, Madjid Merabti
The Threat From Within -An Analysis of Attacks on anInternal Network. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:133-146 [Conf]
- Simeon Xenitellis
Security Vulnerabilities in Event-Driven Systems. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:147-160 [Conf]
- J. J. Yan
Denial of Service: Another Example. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:161-170 [Conf]
- D. Salah, Heba Kamal Aslan, Mahmoud T. El-Hadidi
A Detection Scheme for the SK Virus. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:171-182 [Conf]
- Teemupekka Virtanen, Ronja Addams-Moring
An Information Security Curriculum in Finland. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:183-190 [Conf]
- Thomas Schlienger, Stephanie Teufel
Information Security Culture: The Socio-Cultural Dimension in Information Security Management. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:191-202 [Conf]
- A. Martins, Jan H. P. Eloff
Information Security Culture. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:203-214 [Conf]
- Paul Dowland, Steven Furnell, Maria Papadaki
Keystroke Analysis as a Method of Advanced User Authentication and Response. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:215-226 [Conf]
- Magdi M. S. El-Soudani, H. S. El-Refaey, H. M. Mourad
Zero Knowledge Broadcasting Identification Scheme. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:227-238 [Conf]
- Li-Sha He, Ning Zhang, Li-Rong He
A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:239-250 [Conf]
- Carla Merkle Westphall, Joni da Silva Fraga, Carlos Becker Westphall, S. C. S. Bianchi
Mandatory Security Policies for CORBA Security Model. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:251-262 [Conf]
- Carla Merkle Westphall, Joni da Silva Fraga, Michelle S. Wangham, Rafael R. Obelheiro, Lau Cheuk Lung
Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:263-274 [Conf]
- Marijke Coetzee, Jan H. P. Eloff
Secure Database Connectivity on the WWW. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:275-286 [Conf]
- Reinhardt A. Botha
Towards Semantic Integrity in Rational Databases. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:287-298 [Conf]
- G. Osman, M. G. Darwish, M. Zaki
Formal Design of Packet Filtering Systems. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:299-310 [Conf]
- E. Mohammed, A. Emarah, Kh. El-Shennawy
Elliptic Curve Cryptosystems on Smart Cards. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:311-322 [Conf]
- T. Demuth
Establishing Bilateral Anonymous Communication in Open Networks. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:323-334 [Conf]
- Christer Magnusson, Louise Yngström
BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:335-346 [Conf]
- Theodore Tryfonas, Evangelos A. Kiountouzis
Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:347-356 [Conf]
- R. Abdel-Moneim, S. El-Kassas, H. Hosny
An Efficient Hybrid Sealed Bid Auction Protocol. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:357-372 [Conf]
- Simone Fischer-Hübner, M. Nilsson, Helena Lindskog
Self-Determination in Mobile Internet: PiMI Prototype Results. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:373-386 [Conf]
- Simon N. Foley, Thomas B. Quillinan, John P. Morrison
Secure Component Distribution Using WebCom. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:387-398 [Conf]
- Ryuya Uda, Masahito Ito, Kohei Awaya, Hiroshi Shigeno, Yutaka Matsushita
E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:399-410 [Conf]
- D. Critchlow, Ning Zhang
An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:411-422 [Conf]
- Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
Secure Selective Exclusion in Ad Hoc Wireless Network. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:423-434 [Conf]
- S. T. Faraj, F. Al-Naima, S. Y. Ameen
Optical Network Models for Quantum Cryptography. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:435-452 [Conf]
- Panagiotes S. Anastasiades
A Unified Regulatory Framework on a European Information Society: Suggested Building Levels. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:453-468 [Conf]
- L. Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas
Revisiting Legal and Regulatory Requirements for Secure E-Voting. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:469-480 [Conf]
- Meletis A. Belsis, Anthony N. Godwin, Leonid Smalov
A Security Incident Data Model. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:481-494 [Conf]
- A. Meier, Susanne Röhrig
Security Levels for Contracting Agents. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:495-506 [Conf]
- S. Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou
Functional Requirements for a Secure Electronic Voting System. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:507-520 [Conf]
- M. Hashem, A. Mohamed, M. Wahib
Intelligent IP Packet Filtering. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:521-535 [Conf]
- Mariki M. Eloff, Jan H. P. Eloff
Human Computer Interaction: An Information Security Perspectives. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:535-546 [Conf]
- J. Geneste
A Very Smart Card for Fighting Against Terrorism. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:547-558 [Conf]
- Michael Meier, Niels Bischof, Thomas Holz
SHEDEL-A Simple Hierarchical Event Description Language for Specifying Attack Signatures. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:559-572 [Conf]
- Kenneth Smith, Donald B. Faatz, Amgad Fayad, Sushil Jajodia
Propagating Modifications to Mobile Policies. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:573-584 [Conf]
|