Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Andrey Jivsov |
WCFB: A Wide Block Encryption for Large Data Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014, pp. 75-82, 2014, SciTePress, 978-989-758-031-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Kelm, Melanie Volkamer |
Towards a Social Engineering Test Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014, pp. 38-48, 2014, SciTePress, 978-989-758-031-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vivaksha J. Jariwala, Devesh C. Jinwala |
Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014, pp. 49-60, 2014, SciTePress, 978-989-758-031-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Luis Márquez Alcañiz, David Garcia Rosado, Daniel Mellado, Eduardo Fernández-Medina |
Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014, pp. 26-37, 2014, SciTePress, 978-989-758-031-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Garcia Rosado, Carlos Blanco 0001, Daniel Mellado, Jan Jürjens, Luis Enrique Sánchez (eds.) |
WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![SciTePress, 978-989-758-031-4 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Ajay Nagarajan, Arun Sood |
SCIT Based Moving Target Defense Reduces and Shifts Attack Surface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014, pp. 14-25, 2014, SciTePress, 978-989-758-031-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Francisco Martín-Fernández, Pino Caballero-Gil, Cándido Caballero-Gil, Jezabel Molina-Gil |
Increasing Privacy and Trust in Cooperative Social Platforms for Vehicular Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014, pp. 3-13, 2014, SciTePress, 978-989-758-031-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Changwei Liu, Anoop Singhal, Duminda Wijesekera |
A Model Towards Using Evidence from Security Events for Network Attack Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014, pp. 83-95, 2014, SciTePress, 978-989-758-031-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christian Schmitt 0002, Peter Liggesmeyer |
Implications of the Operational Environmental on Software Security Requirements Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014, pp. 63-74, 2014, SciTePress, 978-989-758-031-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jezabel Molina-Gil, Pino Caballero-Gil, Cándido Caballero-Gil |
Enhancing Cooperation in Wireless Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 91-102, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Angel Gallego, Antonio Santos-Olmo, Luis Enrique Sánchez, Eduardo Fernández-Medina |
Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 159-166, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | David Garcia Rosado, Luis Enrique Sánchez, Jan Jürjens (eds.) |
WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![SciTePress, 978-989-8425-61-4 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | HonGian Karen Lu |
Accessing Cloud through API in a More Secure and Usable Way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 25-38, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Waldo Rocha Flores, Mathias Ekstedt |
Information Security Governance Analysis Using Probabilistic Relational Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 142-150, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Ye Hou, Ping Gao 0003, Richard Heeks 0001 |
The Influence of Institutional Forces on Employee Compliance with Information Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 132-141, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina |
A Comparative Review of Cloud Security Proposals with ISO/IEC 27002. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 3-12, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Haibo Hu 0002, Dan Yang 0001, Hong Xiang, Li Fu, Chunxiao Ye, Ren Li |
Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 103-112, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Santiago Moral-García, Santiago Moral-Rubio, Eduardo Fernández-Medina |
Security Pattern Mining: Systematic Review and Proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 13-24, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Jérôme Dossogne, Stephane Fernandes Medeiros |
Enhancing Cryptographic Code against Side Channel Cryptanalysis with Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 39-48, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt |
Expert Assessment on the Probability of Successful Remote Code Execution Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 49-58, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Jaime Devesa, Xabier Cantero, Gonzalo Álvarez Marañón, Pablo García Bringas |
An efficient Security Solution for Dealing with Shortened URL Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 70-79, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Min-Hua Shao, Yi-Ping Lee, Yen-Fen Hou, Cheng-Yi Ho |
A Trusted Routing Based Service Discovery Protocol with Backup Nodes in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 115-122, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Antonio Santos-Olmo, Luis Enrique Sánchez, Eduardo Fernández-Medina, Mario Piattini |
Desirable Characteristics for an ISMS oriented to SMEs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 151-158, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Dina Satybaldina, Altynbek Sharipbayev, Aigul Adamova |
Implementation of the Finite Automaton Public Key Cryptosystem on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 167-173, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Roberto Ortiz, Santiago Moral-Rubio, Javier Garzás, Eduardo Fernández-Medina |
Towards a Pattern-based Security Methodology to Build Secure Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 59-69, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Sergey Butakov, Craig Barber, Vadim Diagilev, Alexey Mikhailov |
Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 123-131, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Alban Gabillon |
A Privacy Model for Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011, pp. 80-90, 2011, SciTePress, 978-989-8425-61-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | William R. Claycomb, Dongwan Shin |
An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 36-45, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Juan Jose Roque |
SLSB: Improving the Steganographic Algorithm LSB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 57-66, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Luis Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernández-Medina, Mario Piattini |
MMSM-SME: Methodology for the Management of Security and its Maturity in SME. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 67-78, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Axel Schröpfer, Florian Kerschbaum, Dagmar Sadkowiak, Richard Pibernik |
Risk-Aware Secure Supply Chain Master Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 46-56, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Basel Alomair, Radha Poovendran |
Unconditionally Secure Authenticated Encryption with Shorter Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 5-15, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Candelaria Hernández-Goya, Pino Caballero-Gil, Amparo Fúster-Sabater |
Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 103-110, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Alfonso Rodríguez 0001, Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina (eds.) |
Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![INSTICC Press, 978-989-8111-91-3 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Corrado Aaron Visaggio, Francesca de Rosa |
Managing Security Knowledge through Case based Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 127-136, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Óscar Sánchez Ramón, Fernando Molina, Jesús García Molina, José Ambrosio Toval Álvarez |
A Model Driven Approach for Generating Code from Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 119-126, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Víctor Torres, Jaime Delgado, Xavier Maroñas, Silvia Llorente, Marc Gauvin |
Enhancing Rights Management Systems through the Development of Trusted Value Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 26-35, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Boustia Narhimene, Aïcha Mokhtari |
DLδε-OrBAC: Context based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 111-118, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Mukhtiar Memon, Michael Hafner, Ruth Breu |
Security as a Service - A Reference Architecture for SOA Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 79-89, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Pino Caballero-Gil, Amparo Fúster-Sabater, Candelaria Hernández-Goya |
Deterministic Cryptanalysis of some Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 16-25, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Jonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li |
Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009, pp. 93-102, 2009, INSTICC Press, 978-989-8111-91-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Koen Buyens, Bart De Win, Wouter Joosen |
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 145-150, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Asmaa Adnane, Christophe Bidan, Rafael T. de Sousa Jr. |
Effectiveness of Trust Reasoning for Attack Detection in OLSR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 151-157, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Michael VanHilst, Eduardo B. Fernández, Fabrício A. Braz |
A Multi-Dimensional Classification for Users of Security Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 89-98, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Qutaibah Althebyan, Brajendra Panda |
Knowledge Extraction and Management for Insider Threat Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 99-110, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Marco Ramilli, Marco Prandini |
Adaptive Filtering of Comment Spam in Multi-user Forums and Blogs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 122-132, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Sushmita Ruj, Bimal K. Roy |
Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 68-77, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Michele Chinosi, Alberto Trombetta |
Integrating Privacy Policies into Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 13-25, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Alfonso Rodríguez 0001, Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina (eds.) |
Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![INSTICC Press, 978-989-8111-44-9 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Pino Caballero-Gil, Amparo Fúster-Sabater, Maria Eugenia Pazo-Robles |
New Attack Strategy for the Shrinking Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 59-67, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Ralph Herkenhöner |
Process Modeling for Privacy - Conformant Biobanking: Case Studies on Modeling in UMLsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 3-12, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Carlos Blanco 0001, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo 0001, Mario Piattini |
Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 38-48, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Sergio Pozo, Rafael Ceballos, Rafael M. Gasca |
Firewall Rule Set Inconsistency Characterization by Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 138-144, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | William M. Fitzgerald, Simon N. Foley, Mícheál Ó Foghlú |
Network Access Control Interoperation using Semantic Web Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 26-37, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Cameron Ross Dunne, Thibault Candebat, David Gray |
An Access Control Model for Location based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 49-58, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Min-Hua Shao, Shin-Jia Huang |
Trust-Aware Anonymous and Efficient Routing for Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 132-137, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Heinz Lothar Grob, Gereon Strauch, Jan Hermans |
Conceptual Design of a Method to Support IS Security Investment Decisions within the Context of Critical Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 113-121, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Joaquín Lasheras, Rafael Valencia-García, Jesualdo Tomás Fernández-Breis, José Ambrosio Toval Álvarez |
An Ontology-Based Framework for Modelling Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 78-88, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Azzam Mourad, Marc-André Laverdière, Mourad Debbabi |
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 123-130, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Berthold Agreiter, Michael Hafner, Ruth Breu |
A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 63-72, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Florian Kerschbaum |
A New Way to Think About Secure Computation: Language-based Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 33-42, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Manuel Sáchez Cuenca, Gabriel López 0001, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
A Proposal for Extending the Eduroam Infrastructure with Authorization Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 23-32, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Omid Tafreschi, Dominique Maehler, Janina Fengel, Michael Rebstock, Claudia Eckert 0001 |
A Reputation System for Electronic Negotiations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 53-62, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Katalin Anna Lázá, Csilla Farkas |
Security in TciNMP Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 95-104, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina (eds.) |
Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![INSTICC Press, 978-972-8865-96-2 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Ernesto Damiani, Majirus Fansi, Alban Gabillon, Stefania Marrara |
A General Approach to Securely Querying XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 115-122, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Barry Sweeney, Duminda Wijesekera |
Comparison of IPsec to TLS and SRTP for Securing VoIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 82-92, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Silvia Llorente, Jaime Delgado, Xavier Maroñas |
Implementing Mobile DRM with MPEG 21 and OMA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 166-175, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini |
SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 220-232, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Rui Guo, Guiran Chang, Ruidong Hou, Baojing Sun, An Liu, Bencheng Zhang |
Research on Counter Http DDoS Attacks based on Weighted Queue Random Early Drop . ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 73-81, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Stefan Böttcher |
Inferring Secret Information in Relational Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 179-187, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Marco Ramilli, Marco Prandini |
RoboAdmin: A Different Approach to Remote System Administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 43-52, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Gerardo Canfora, Corrado Aaron Visaggio |
A Three Layered Model to Implement Data Privacy Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 155-165, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Emilio Soler, Juan Trujillo 0001, Eduardo Fernández-Medina, Mario Piattini |
SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 245-256, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Daniel Kadenbach, Carsten Kleiner, Lukas Grittner |
A DRM Architecture for Securing User Privacy by Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 188-195, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Víctor Rodríguez-Doncel, Marc Gauvin, Jaime Delgado |
An Ontology for the Expression of Intellectual Property Entities and Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 196-203, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Ruth Breu |
Model-Driven Approaches to Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 3, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Marco Prandini, Eugenio Faldella, Roberto Laschi |
Confining the Insider Threat in Mass Virtual Hosting Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 105-114, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Reine Lundin, Thijs Holleboom, Stefan Lindskog |
On the Relationship between Confidentiality Measures: Entropy and Guesswork. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 135-144, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Klaus Plößl, Hannes Federrath |
A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 145-154, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Alfonso Rodríguez 0001, Ignacio García Rodríguez de Guzmán |
Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 209-219, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Luís Enrique Sanchez, Daniel Villafranca, Mario Piattini |
MMISS-SME Practical Development: Maturity Model for Information Systems Security Management in SMEs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 233-244, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Anna Zych, Milan Petkovic, Willem Jonker |
A Key Management Method for Cryptographically Enforced Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007, pp. 9-22, 2007, INSTICC Press, 978-972-8865-96-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Eva Rodríguez, Silvia Llorente, Jaime Delgado |
Protecting Notification of Events in Multimedia Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 153-162, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Miguel A. Martínez 0002, Joaquín Lasheras, José Ambrosio Toval Álvarez, Mario Piattini |
An Audit Method of Personal Data Based on Requirements Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 217-231, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen |
Improving Intrusion Detection through Alert Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 207-216, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Antti Tuomisto, Mikko Savela |
Information Security and Business Continuity in SMEs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 80-90, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Simone Lupetti, Feike W. Dillema, Tage Stabell-Kulø |
Names in Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 185-194, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Manuel Sánchez, Gabriel López 0001, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
Grid Authorization Based on Existing AAA Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 3-12, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Serge Chaumette, Achraf Karray, Damien Sauveron |
The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 101-114, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Oleksiy Mazhelis, Anton Naumenko |
The Place and Role of Security Patterns in Software Development Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 91-100, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Athanasios Moralis, Angelos Lenis, Mary Grammatikou, Symeon Papavassiliou, Basil S. Maglaris |
A Distributed Kerberized Access Architecture for Real Time Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 23-32, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini |
SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 135-145, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Christos K. Dimitriadis |
Honeynets in 3G - A Game Theoretic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 146-152, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Alfonso Rodríguez 0001, Eduardo Fernández-Medina, Mario Piattini |
Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 174-184, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera |
Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 267-277, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Martin Steinebach, Sascha Zmudzinski, Sergey Neichtadt |
Robust-audio-hash Synchronized Audio Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 58-66, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Yi Hu, Brajendra Panda |
Modeling Deceptive Action in Virtual Communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 125-134, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Sébastien Canard, Fabrice Clerc, Benjamin Morin |
A Secure Universal Loyalty Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 13-22, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis |
Secure Deployment of Applications to Fielded Devices and Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006, pp. 195-206, 2006, INSTICC Press, 978-972-8865-52-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|