The SCEAS System
Navigation Menu

Conferences in DBLP

Security in Information Systems (sis)
2004 (conf/sis/2004)

  1. Ruth Breu, Klaus Burger, Michael Hafner, Gerhard Popp
    Towards a Systematic Development of Secure Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:1-12 [Conf]
  2. Gail-Joon Ahn, Seng-Phil Hong
    Group Hierarchies with Constrained User Assignment in Linux. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:13-22 [Conf]
  3. Christos K. Dimitriadis, Despina Polemi
    Risk Analysis of Biometric Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:23-32 [Conf]
  4. Jan Guynes Clark, Nicole Beebe, Andrew G. Kotulic
    Integrating Security and Privacy Issues in System Design. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:33-46 [Conf]
  5. Juan Manuel Garcia Garcia
    Intrusion Risk Analysis and the Power Law Distribution of Attacks. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:47-52 [Conf]
  6. Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell
    An Efficient Off-Line Reputation Scheme Using Articulated Certificates. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:53-62 [Conf]
  7. Javier Herranz
    A formal proof of security of Zhang and Kim's ID-based ring signature scheme. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:63-72 [Conf]
  8. Marino Tapiador, Juan A. Sigüenza
    B2C Internet Authentication method using Statistical Keystroke Biometrics. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:73-78 [Conf]
  9. Vasilios Katos
    Diffusion Behaviour of Cryptographic Primitives in Feistel Networks. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:79-87 [Conf]
  10. Dorgham Sisalem, Jiri Kuthan
    Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:88-98 [Conf]
  11. Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon
    Taxonomy of Trust Relationships in Peer-to-Peer (P2P) Communication. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:99-103 [Conf]
  12. Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le
    A Secure Prepaid Wireless Micropayment Protocol. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:104-113 [Conf]
  13. Ulf T. Mattsson
    A Practical Implementation of a Real-time Intrusion Prevention System for Commercial Enterprise Databases. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:114-125 [Conf]
  14. Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker
    Efficient Tree Search in Encrypted Data. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:126-135 [Conf]
  15. Yibing Kong, Janusz R. Getta, Ping Yu, Jennifer Seberry
    A Generalized Policy Support System and Its Hierarchy Semantics. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:136-145 [Conf]
  16. Anat Hovav, John D'Arcy
    The Impact of Virus Attack Announcements on the Market Value of Firms. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:146-156 [Conf]
  17. Salem Aljareh, B. Nick Rossiter, Michael A. Heather
    A Formal Security Model for Collaboration in Multi-agency Networks. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:157-169 [Conf]
  18. Christian Tobias
    Security Analysis of MOR using GL(2, R) xThetaZn. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:170-179 [Conf]
  19. Carlos Serrão, Gregor Siegert
    Open Secure Infrastructure to control User Access to multimedia content. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:180-185 [Conf]
  20. Weiliang Zhao, Vijay Varadharajan, George Bryan
    Fair Trading Protocol With Off-line Anonymous Credit Card Payment. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:186-195 [Conf]
  21. Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell
    Private Reputation Schemes for P2P systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:196-206 [Conf]
  22. Víctor Méndez Muñoz, Julio César Hernández Castro, Jesús Carretero, Félix García
    Filtering spam at e-mail server level with improved CRM114. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:207-216 [Conf]
  23. Souhila Kaci, Abdeslam Ali-Laouar, Frédéric Cuppens
    Health care and social inference systems: An unauthorized inference control based on fuzzy logic. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:217-226 [Conf]
  24. Ioannis Priggouris, Stathes Hadjiefthymiades, Lazaros F. Merakos
    An XML framework for multi-level access control in the enterprise domain. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:227-236 [Conf]
  25. Erik Zenner
    On the Role of the Inner State Size in Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:237-250 [Conf]
  26. Bat-Odon Purevjii, Toshiyuki Amagasa, Sayaka Imai, Yoshinari Kanamori
    An Access Control Model for Geographic Data in an XML -based Framework. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:251-260 [Conf]
  27. Vipul Goyal
    Certificate Revocation Lists or Online Mechanisms. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:261-268 [Conf]
  28. Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Francisco Sanchez
    Semantic Interoperability of Authorizations. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:269-278 [Conf]
  29. Zouheir Trabelsi, Hamza Rahmani
    Promiscuous Mode Detection Platform. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:279-292 [Conf]
  30. Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Web Services Security: is the problem solved? [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:293-304 [Conf]
  31. José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda
    Secure Communications in Multi-Agent Systems Protecting KQML. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:305-313 [Conf]
  32. Ping Lin, K. Selçuk Candan
    Hiding Traversal of Tree Structured Data from Untrusted Data Stores. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:314-323 [Conf]
  33. Arnulfo Ochoa Indart, Jesús Arturo Pérez Díaz
    Analysis of WEP Performance on Mobile Devices. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:324-331 [Conf]
  34. Nimal Nissanke, Etienne J. Khayat
    Risk Based Security Analysis of Permissions in RBAC. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:332-341 [Conf]
  35. Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini
    Towards a Classification of Security Metrics. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:342-350 [Conf]
  36. L. Javier García-Villalba, J. Hamilton Ortiz Monedero, R. Paucar Curasma
    Security in the Management of Networks with SNMPv3. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:351-360 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002