The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
1996 (conf/sec/1996)

  1. Jean Hitchings
    A practical solution to the complex human issues of information security design. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:3-12 [Conf]
  2. Ralph Holbein, Stephanie Teufel, Kurt Bauknecht
    The use of business process models for security design in organisations. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:13-22 [Conf]
  3. Evangelos A. Kiountouzis, Spyros Kokolakis
    An analyst's view of IS security. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:23-35 [Conf]
  4. Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann
    Location management strategies increasing privacy in mobile communication. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:39-48 [Conf]
  5. Shiuh-Jeng Wang, Le-Pond Chin, Jin-Fu Chang, Ywh-Ren Tsai
    ID-based authentication for mobile conference call. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:49-58 [Conf]
  6. Hilary H. Hosmer
    New security paradigms: orthodoxy and heresy. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:61-73 [Conf]
  7. Richard G. Wilsher, Helmut Kurth
    Security assurance in information systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:74-87 [Conf]
  8. Eric Dubois, Suchun Wu
    A framework for dealing with and specifying security requirements in information systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:88-99 [Conf]
  9. William List
    The effects of time on integrity in information systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:100-107 [Conf]
  10. N. H. Pope, J. G. Ross
    EPHOS security: procurement of secure open systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:111-121 [Conf]
  11. Martin P. J. Kratz
    Canada's computer crime laws: ten years of experience. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:122-141 [Conf]
  12. Luc Golvers
    Delivery and installation of software: disputes and the burden of proof. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:142-150 [Conf]
  13. Sebastiaan H. von Solms
    Information security on the electronic superhighway. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:153-166 [Conf]
  14. Richard Baskerville
    A taxonomy for analyzing hazards to information systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:167-176 [Conf]
  15. Marc Dacier, Yves Deswarte, Mohamed Kaâniche
    Models and tools for quantitative assessment of operational security. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:177-186 [Conf]
  16. Les Labuschagne, Jan H. P. Eloff
    Activating dynamic counter measures to reduce risk. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:187-196 [Conf]
  17. Rolf Oppliger, Andres Albanese
    Distributed registration and key distribution (DiRK). [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:199-208 [Conf]
  18. He Jingmin, Ed Dawson
    On the reconstruction of shared secrets. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:209-218 [Conf]
  19. Hannes Hassler, Vesna Hassler, Reinhard Posch
    A hierarchical threshold scheme with unique partial keys. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:219-226 [Conf]
  20. Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, D. Peppes
    Efficient and provably secure key agreement. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:227-236 [Conf]
  21. Hyun Park, Randy Chow
    Internetwork access control using public key certificates. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:237-246 [Conf]
  22. Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A. Min Tjoa
    The security architecture of IRO-DB. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:249-258 [Conf]
  23. S. Jadodia, K. P. Smith, Barbara T. Blaustein, LouAnna Notargiacomo
    Securely executing multilevel transactions. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:259-270 [Conf]
  24. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    A decentralized temporal autoritzation model. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:271-280 [Conf]
  25. Steven Furnell, Joseph P. Morrissey, Peter W. Sanders, Colin T. Stockel
    Applications of keystroke analysis for improved login security and continuous user authentication. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:283-294 [Conf]
  26. Johan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms
    MoFAC: a model for fine-grained access control. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:295-305 [Conf]
  27. Wilna Jansen van Rensburg, Martin S. Oliver
    A discretionary security model for object oriented environments. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:306-316 [Conf]
  28. Thomas Spyrou, John Darzentas
    Intention modelling: approximating computer user intentions for detection and prediction of intrusions. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:319-336 [Conf]
  29. I. Kantzavelou, A. Patel
    An attack detection system for secure computer systems - design of the ADS. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:337-347 [Conf]
  30. Louise Yngström
    IT security and privacy education. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:351-364 [Conf]
  31. H. James, K. Andronis, William Paul
    A human approach to security management in health care. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:365-376 [Conf]
  32. G. Vassilacopoulos, Vassilios Chrissikopoulos, D. Peppes
    Security enforcement in a European medical device vigilance system network. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:377-386 [Conf]
  33. George Pangalos, Marie Khair
    Design of secure medical database systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:387-401 [Conf]
  34. Ian Uttridge, Gualtiero Bazzana, Massimo Giunchi, Gemma Deler, Stéphane Geyres, Josef Heiler
    Evaluation of the security of distributed IT sytems through ITSEC/ITSEM: experiences and findings. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:405-416 [Conf]
  35. Theodore K. Apostolopoulos, Victoria C. Daskalou
    SNMP-based network security management using a temporal database approach. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:417-427 [Conf]
  36. N. Nikitakos, Stefanos Gritzalis, Panagiotis Georgiadis
    Security profile for interconnected open distributed systems with varying vulnerability. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:428-437 [Conf]
  37. Sean O'Connell, A. Patel
    A model for the detection of the message stream delay attack. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:438-451 [Conf]
  38. Vijay Varadharajan, Thomas Hardjono
    Security model for distributed object framework and its applicability to CORBA. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:452-463 [Conf]
  39. S. A. Frangos
    Software quality assurance: the underlying framework for achieving secure and reliable software systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:467-474 [Conf]
  40. Thomas Gast, Klaus Keus
    Configuration management - a basis of the high assurance software engineering process. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:477-479 [Conf]
  41. E. Delacour
    Multi-purpose security module based on smart cards. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:480-481 [Conf]
  42. Nicholas Yialelis, Morris Sloman
    An authentication service supporting domain-based access control policies. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:482-484 [Conf]
  43. Claudia Eckert
    On security models. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:485-486 [Conf]
  44. Simone Fischer-Hübner, Kathrin Schier
    Risks on the way to the global information society. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:487-488 [Conf]
  45. Thilo Baldin, Gerrit Bleumer
    Crypto Manager: an object oriented software library for cryptographic mechanisms. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:489-491 [Conf]
  46. Andrew Hutchison, Kurt Bauknecht
    Cryptographic key distribution and authentication protocols for secure group communication. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:492-493 [Conf]
  47. Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan
    A new hybrid encryption scheme for computer networks. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:494-495 [Conf]
  48. Václav Matyás Jr.
    From zero-knowledge to a practical authentication protocol. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:496-497 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002