The SCEAS System
Navigation Menu

Conferences in DBLP

Security in Information Systems (sis)
2006 (conf/sis/2006)

  1. Manuel Sánchez, Gabriel López, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta
    Grid Authorization Based on Existing AAA Architectures. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:3-12 [Conf]
  2. Sébastien Canard, Fabrice Clerc, Benjamin Morin
    A Secure Universal Loyalty Card. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:13-22 [Conf]
  3. A. Moralis, Angelos Lenis, Mary Grammatikou, Symeon Papavassiliou, Basil S. Maglaris
    A Distributed Kerberized Access Architecture for Real Time Grids. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:23-32 [Conf]
  4. Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini
    A Model Driven Approach for Secure XML Database Development. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:33-46 [Conf]
  5. Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak
    SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:47-57 [Conf]
  6. Martin Steinebach, Sascha Zmudzinski, Sergey Neichtadt
    Robust-audio-hash Synchronized Audio Watermarking. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:58-66 [Conf]
  7. Eliana Stavrou, Andreas Pitsillides
    Securing Mobile Healthcare Systems Based on Information Classification: DITIS Case Study. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:67-79 [Conf]
  8. Antti Tuomisto, Mikko Savela
    Information Security and Business Continuity in SMEs. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:80-90 [Conf]
  9. Oleksiy Mazhelis, Anton Naumenko
    The Place and Role of Security Patterns in Software Development Process. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:91-100 [Conf]
  10. Serge Chaumette, Achraf Karray, Damien Sauveron
    The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:101-114 [Conf]
  11. Vladimir M. Chernov, Oleg Bespolitov
    A New Method for Embedding Secret Data to the Container Image Using 'Chaotic' Discrete Orthogonal Transforms. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:115-124 [Conf]
  12. Yi Hu, Brajendra Panda
    Modeling Deceptive Action in Virtual Communities. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:125-134 [Conf]
  13. Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:135-145 [Conf]
  14. Christos K. Dimitriadis
    Honeynets in 3G - A Game Theoretic Analysis. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:146-152 [Conf]
  15. Eva Rodríguez, Silvia Llorente, Jaime Delgado
    Protecting Notification of Events in Multimedia Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:153-162 [Conf]
  16. David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
    Security Patterns Related to Security Requirements. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:163-173 [Conf]
  17. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:174-184 [Conf]
  18. Simone Lupetti, Feike W. Dillema, Tage Stabell-Kulø
    Names in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:185-194 [Conf]
  19. William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis
    Secure Deployment of Applications to Fielded Devices and Smart Cards. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:195-206 [Conf]
  20. Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen
    Improving Intrusion Detection through Alert Verification. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:207-216 [Conf]
  21. Miguel A. Martínez, Joaquín Lasheras, José Ambrosio Toval Álvarez, Mario Piattini
    An Audit Method of Personal Data Based on Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:217-231 [Conf]
  22. Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael
    An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:232-245 [Conf]
  23. Charlott Eliasson, Andre Zuquete
    An Electronic Voting System Supporting VoteWeights. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:246-255 [Conf]
  24. Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini
    Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:256-266 [Conf]
  25. Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera
    Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:267-277 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002