|
Conferences in DBLP
- Manuel Sánchez, Gabriel López, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta
Grid Authorization Based on Existing AAA Architectures. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:3-12 [Conf]
- Sébastien Canard, Fabrice Clerc, Benjamin Morin
A Secure Universal Loyalty Card. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:13-22 [Conf]
- A. Moralis, Angelos Lenis, Mary Grammatikou, Symeon Papavassiliou, Basil S. Maglaris
A Distributed Kerberized Access Architecture for Real Time Grids. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:23-32 [Conf]
- Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini
A Model Driven Approach for Secure XML Database Development. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:33-46 [Conf]
- Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak
SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:47-57 [Conf]
- Martin Steinebach, Sascha Zmudzinski, Sergey Neichtadt
Robust-audio-hash Synchronized Audio Watermarking. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:58-66 [Conf]
- Eliana Stavrou, Andreas Pitsillides
Securing Mobile Healthcare Systems Based on Information Classification: DITIS Case Study. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:67-79 [Conf]
- Antti Tuomisto, Mikko Savela
Information Security and Business Continuity in SMEs. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:80-90 [Conf]
- Oleksiy Mazhelis, Anton Naumenko
The Place and Role of Security Patterns in Software Development Process. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:91-100 [Conf]
- Serge Chaumette, Achraf Karray, Damien Sauveron
The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:101-114 [Conf]
- Vladimir M. Chernov, Oleg Bespolitov
A New Method for Embedding Secret Data to the Container Image Using 'Chaotic' Discrete Orthogonal Transforms. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:115-124 [Conf]
- Yi Hu, Brajendra Panda
Modeling Deceptive Action in Virtual Communities. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:125-134 [Conf]
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:135-145 [Conf]
- Christos K. Dimitriadis
Honeynets in 3G - A Game Theoretic Analysis. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:146-152 [Conf]
- Eva Rodríguez, Silvia Llorente, Jaime Delgado
Protecting Notification of Events in Multimedia Systems. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:153-162 [Conf]
- David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
Security Patterns Related to Security Requirements. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:163-173 [Conf]
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:174-184 [Conf]
- Simone Lupetti, Feike W. Dillema, Tage Stabell-Kulø
Names in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:185-194 [Conf]
- William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis
Secure Deployment of Applications to Fielded Devices and Smart Cards. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:195-206 [Conf]
- Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen
Improving Intrusion Detection through Alert Verification. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:207-216 [Conf]
- Miguel A. Martínez, Joaquín Lasheras, José Ambrosio Toval Álvarez, Mario Piattini
An Audit Method of Personal Data Based on Requirements Engineering. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:217-231 [Conf]
- Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael
An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:232-245 [Conf]
- Charlott Eliasson, Andre Zuquete
An Electronic Voting System Supporting VoteWeights. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:246-255 [Conf]
- Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini
Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:256-266 [Conf]
- Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera
Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:267-277 [Conf]
|