Conferences in DBLP
Jean Hitchings A practical solution to the complex human issues of information security design. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:3-12 [Conf ] Ralph Holbein , Stephanie Teufel , Kurt Bauknecht The use of business process models for security design in organisations. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:13-22 [Conf ] Evangelos A. Kiountouzis , Spyros Kokolakis An analyst's view of IS security. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:23-35 [Conf ] Dogan Kesdogan , Hannes Federrath , Anja Jerichow , Andreas Pfitzmann Location management strategies increasing privacy in mobile communication. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:39-48 [Conf ] Shiuh-Jeng Wang , Le-Pond Chin , Jin-Fu Chang , Ywh-Ren Tsai ID-based authentication for mobile conference call. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:49-58 [Conf ] Hilary H. Hosmer New security paradigms: orthodoxy and heresy. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:61-73 [Conf ] Richard G. Wilsher , Helmut Kurth Security assurance in information systems. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:74-87 [Conf ] Eric Dubois , Suchun Wu A framework for dealing with and specifying security requirements in information systems. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:88-99 [Conf ] William List The effects of time on integrity in information systems. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:100-107 [Conf ] N. H. Pope , J. G. Ross EPHOS security: procurement of secure open systems. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:111-121 [Conf ] Martin P. J. Kratz Canada's computer crime laws: ten years of experience. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:122-141 [Conf ] Luc Golvers Delivery and installation of software: disputes and the burden of proof. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:142-150 [Conf ] Sebastiaan H. von Solms Information security on the electronic superhighway. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:153-166 [Conf ] Richard Baskerville A taxonomy for analyzing hazards to information systems. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:167-176 [Conf ] Marc Dacier , Yves Deswarte , Mohamed Kaâniche Models and tools for quantitative assessment of operational security. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:177-186 [Conf ] Les Labuschagne , Jan H. P. Eloff Activating dynamic counter measures to reduce risk. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:187-196 [Conf ] Rolf Oppliger , Andres Albanese Distributed registration and key distribution (DiRK). [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:199-208 [Conf ] He Jingmin , Ed Dawson On the reconstruction of shared secrets. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:209-218 [Conf ] Hannes Hassler , Vesna Hassler , Reinhard Posch A hierarchical threshold scheme with unique partial keys. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:219-226 [Conf ] Nikos Alexandris , Mike Burmester , Vassilios Chrissikopoulos , D. Peppes Efficient and provably secure key agreement. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:227-236 [Conf ] Hyun Park , Randy Chow Internetwork access control using public key certificates. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:237-246 [Conf ] Wolfgang Eßmayr , Fritz Kastner , Günther Pernul , A. Min Tjoa The security architecture of IRO-DB. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:249-258 [Conf ] S. Jadodia , K. P. Smith , Barbara T. Blaustein , LouAnna Notargiacomo Securely executing multilevel transactions. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:259-270 [Conf ] Elisa Bertino , Claudio Bettini , Elena Ferrari , Pierangela Samarati A decentralized temporal autoritzation model. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:271-280 [Conf ] Steven Furnell , Joseph P. Morrissey , Peter W. Sanders , Colin T. Stockel Applications of keystroke analysis for improved login security and continuous user authentication. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:283-294 [Conf ] Johan S. von Solms , Martin S. Olivier , Sebastiaan H. von Solms MoFAC: a model for fine-grained access control. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:295-305 [Conf ] Wilna Jansen van Rensburg , Martin S. Oliver A discretionary security model for object oriented environments. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:306-316 [Conf ] Thomas Spyrou , John Darzentas Intention modelling: approximating computer user intentions for detection and prediction of intrusions. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:319-336 [Conf ] I. Kantzavelou , A. Patel An attack detection system for secure computer systems - design of the ADS. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:337-347 [Conf ] Louise Yngström IT security and privacy education. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:351-364 [Conf ] H. James , K. Andronis , William Paul A human approach to security management in health care. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:365-376 [Conf ] G. Vassilacopoulos , Vassilios Chrissikopoulos , D. Peppes Security enforcement in a European medical device vigilance system network. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:377-386 [Conf ] George Pangalos , Marie Khair Design of secure medical database systems. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:387-401 [Conf ] Ian Uttridge , Gualtiero Bazzana , Massimo Giunchi , Gemma Deler , Stéphane Geyres , Josef Heiler Evaluation of the security of distributed IT sytems through ITSEC/ITSEM: experiences and findings. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:405-416 [Conf ] Theodore K. Apostolopoulos , Victoria C. Daskalou SNMP-based network security management using a temporal database approach. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:417-427 [Conf ] N. Nikitakos , Stefanos Gritzalis , Panagiotis Georgiadis Security profile for interconnected open distributed systems with varying vulnerability. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:428-437 [Conf ] Sean O'Connell , A. Patel A model for the detection of the message stream delay attack. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:438-451 [Conf ] Vijay Varadharajan , Thomas Hardjono Security model for distributed object framework and its applicability to CORBA. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:452-463 [Conf ] S. A. Frangos Software quality assurance: the underlying framework for achieving secure and reliable software systems. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:467-474 [Conf ] Thomas Gast , Klaus Keus Configuration management - a basis of the high assurance software engineering process. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:477-479 [Conf ] E. Delacour Multi-purpose security module based on smart cards. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:480-481 [Conf ] Nicholas Yialelis , Morris Sloman An authentication service supporting domain-based access control policies. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:482-484 [Conf ] Claudia Eckert On security models. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:485-486 [Conf ] Simone Fischer-Hübner , Kathrin Schier Risks on the way to the global information society. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:487-488 [Conf ] Thilo Baldin , Gerrit Bleumer Crypto Manager: an object oriented software library for cryptographic mechanisms. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:489-491 [Conf ] Andrew Hutchison , Kurt Bauknecht Cryptographic key distribution and authentication protocols for secure group communication. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:492-493 [Conf ] Mahmoud T. El-Hadidi , Nadia Hamed Hegazi , Heba Kamal Aslan A new hybrid encryption scheme for computer networks. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:494-495 [Conf ] Václav Matyás Jr. From zero-knowledge to a practical authentication protocol. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:496-497 [Conf ]