Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kai Rannenberg, Vijay Varadharajan, Christian Weber (eds.) |
Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings |
SEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo |
Towards a Theory of White-Box Security. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nathan L. Clarke, Sevasti Karatzouni, Steven Furnell |
Flexible and Transparent User Authentication for Mobile Devices. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag |
Optimization of the Controlled Evaluation of Closed Relational Queries. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shay Gueron, Jean-Pierre Seifert |
On the Impossibility of Detecting Virtual Machine Monitors. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum |
A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
Security Assessment Methodology, NERC CIP, Security Assessment Plan, Risk Analysis, Critical Infrastructure, Cyber Security |
1 | Andreas Fuchs 0002, Sigrid Gürgens, Carsten Rudolph |
On the Security Validation of Integrated Security Solutions. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Jeffery Lotspiech |
Broadcast Encryption for Differently Privileged. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson |
On a Taxonomy of Delegation. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Puneet Gupta, Scott D. Stoller |
Verification of Security Policy Enforcement in Enterprise Systems. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mayla Brusò, Agostino Cortesi |
Non-repudiation Analysis with LySa. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yannis Soupionis, George Tountas, Dimitris Gritzalis |
Audio CAPTCHA for SIP-Based VoIP. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
Mining Stable Roles in RBAC. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Gerald Stefan Kostmajer, Herbert Stögner, Andreas Uhl |
Custom JPEG Quantization for Improved Iris Recognition Accuracy. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt |
Implementation of a Trusted Ticket System. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jan Paul Kolter, Thomas Kernchen, Günther Pernul |
Collaborative Privacy - A Community-Based Privacy Infrastructure. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Anas Abou El Kalam, Philippe Balbiani |
A Policy Language for Modelling Recommendations. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
Discovering Application-Level Insider Attacks Using Symbolic Execution. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yannis Mallios, Sudeep Modi, Aditya Agarwala, Christina Johns |
Persona: Network Layer Anonymity and Accountability for Next Generation Internet. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Lucas Nussbaum, Pierre Neyron, Olivier Richard |
On Robust Covert Channels Inside DNS. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg |
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri |
Which Web Browsers Process SSL Certificates in a Standardized Way? |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sandra Steinbrecher, Stephan Groß, Markus Meichau |
Jason: A Scalable Reputation System for the Semantic Web. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
secure semantic web, privacy-preserving data management, secure information integration, Trust management, identity management, reputation system |
1 | Felix Leder, Peter Martini |
NGBPA Next Generation BotNet Protocol Analysis. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros |
Steganalysis of Hydan. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dimitris Gritzalis, Javier López 0001 (eds.) |
Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yianna Danidou, Burkhard Schafer 0001 |
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo |
On the IPP Properties of Reed-Solomon Codes. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Benzmüller |
Automating Access Control Logics in Simple Type Theory with LEO-II. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Farley, Xinyuan Wang 0005 |
Roving Bugnet: Distributed Surveillance Threat and Mitigation. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Abdullatif Shikfa, Melek Önen, Refik Molva |
Privacy-Preserving Content-Based Publish/Subscribe Networks. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati |
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ashiqur Rahaman, Yves Roudier, Philip Miseldine, Andreas Schaad |
Ontology-Based Secure XML Content Distribution. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo Navarro-Arribas, Joaquín García-Alfaro |
A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Pieter Verhaeghe, Jorn Lapon, Bart De Decker, Vincent Naessens, Kristof Verslype |
Security and Privacy Improvements for the Belgian eID Technology. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka |
How to Bootstrap Security for Ad-Hoc Network: Revisited. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Herbert Leitold, Reinhard Posch, Thomas Rössler |
Media-Break Resistant eSignatures in eGovernment: An Austrian Experience. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Li Yao, Ning Zhang 0001 |
A Generic Authentication LoA Derivation Model. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Sorniotti, Refik Molva |
A Provably Secure Secret Handshake with Dynamic Controlled Matching. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Piva, Claudio Orlandi, Michele Caini, Tiziano Bianchi, Mauro Barni |
Enhancing Privacy in Remote Data Classification. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Slim Rekhis, Jihène Krichène, Noureddine Boudriga |
DigForNet: Digital Forensic in Networking. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Scheffler, Stefan Geiß, Bettina Schnor |
An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shaun Posthumus, Rossouw von Solms |
Agency Theory: Can it be Used to Strengthen IT Governance?. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nouha Oualha, Melek Önen, Yves Roudier |
A Security Protocol for Self-Organizing Data Storage. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Cormac Herley, Dinei A. F. Florêncio |
Protecting Financial Institutions from Brute-Force Attacks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini |
A Live Digital Forensic system for Windows networks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Giorgio Davanzo, Eric Medvet, Alberto Bartoli |
A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nicoletta Dessì, Maria Grazia Fugini, R. A. Balachandar |
Policies and Security Aspects For Distributed Scientific Laboratories. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jeheon Han, Jonghoon Kwon, Heejo Lee |
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Wei Li 0021, Lingyu Wang 0001, Bo Zhu 0001, Lei Zhang 0004 |
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Gail-Joon Ahn, Moonam Ko, Mohamed Shehab |
Portable User-Centric Identity Management. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Longley, Mark Branagan, William J. Caelli, Lam-for Kwok |
Feasibility of Automated Information Security Compliance Auditing. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Aris Gkoulalas-Divanis, Vassilios S. Verykios |
A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
Exact knowledge hiding, Binary integer programming, Parallelization, Constraints satisfaction problems |
1 | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
Investigating the problem of IDS false alarms: An experimental study using Snort. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
Intrusion Detection System, Snort, False Alarm |
1 | Nora Cuppens-Boulahia, Frédéric Cuppens, Diala Abi Haidar, Hervé Debar |
Negotiation of Prohibition: An Approach Based on Policy Rewriting. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Maurizio Adriano Strangio |
Establishing secure links in low-rate wireless personal area networks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Stelios Dritsas, Yannis Soupionis, Marianthi Theoharidou, Yannis Mallios, Dimitris Gritzalis |
SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kristof Verslype, Bart De Decker |
Ubiquitous Privacy-Preserving Identity Managment. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Qutaibah Althebyan, Brajendra Panda |
A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | George O. M. Yee, Larry Korba, Ronggong Song |
Assessing the Likelihood of Privacy Policy Compliance. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Samuel N. Hamilton, Wendy L. Hamilton |
Adversary Modeling and Simulation in Cyber Warfare. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Bellettini, Julian L. Rrushi |
A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yngve Espelid, Lars-Helge Netland, André N. Klingsheim, Kjell Jørgen Hole |
Robbing Banks with Their Own Software-an Exploit Against Norwegian Online Banks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jianying Zhou 0001, Tanmoy Kanti Das, Javier López 0001 |
An Asynchronous Node Replication Attack in Wireless Sensor Networks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
Node Replication Attack, Distributed Detection Protocol, Wireless Sensor Network Security |
1 | Florian Kerschbaum |
Practical Privacy-Preserving Benchmarking. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao |
User Session Modeling for Effective Application Intrusion Detection. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Pierangela Samarati, Stelvio Cimato (eds.) |
Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy |
SEC |
2008 |
DBLP BibTeX RDF |
|
1 | Patrick P. Tsang, Sean W. Smith |
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Le Métayer, Claire Loiseaux |
ASTRA : A Security Analysis Method Based on Asset Tracking. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Joonsang Baek, Han Chiang Tan, Jianying Zhou 0001, Jun Wen Wong |
Realizing Stateful Public Key Encryption in Wireless Sensor Network. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Salem Benferhat, Karim Tabia |
Classification features for detecting Server-side and Client-side Web attacks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Dadeau, Marie-Laure Potet, Régis Tissot |
A B Formal Framework for Security Developments in the Domain of Smart Card Applications. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
Conformance Relation, Access Control, Traceability, Security Model, B Method, Common Criteria |
1 | Karsten Nohl, David Evans 0001 |
Hiding in Groups: On the Expressiveness of Privacy Distributions. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Jeffery Lotspiech, Nimrod Megiddo |
Efficient Coalition Detection in Traitor Tracing. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Neubauer, Andreas Ekelhart, Stefan Fenz |
Interactive Selection of ISO 27001 Controls under Multiple Objectives. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dongwon Seo, Heejo Lee, Ejovi Nuwere |
Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Muntaha Alawneh, Imad M. Abbadi |
Software Licence Protection and Management for Organisations. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Majorczyk, Eric Totel, Ludovic Mé, Ayda Saïdane |
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
COTS diversity, anomaly diagnosis, graph similarity, anomaly detection, design diversity |
1 | Po-Yuan Teng, Shih-I Huang, Adrian Perrig |
Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michele Colajanni, Daniele Gozzi, Mirco Marchetti |
Collaborative architecture for malware detection and analysis. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis |
A new Accounting Mechanism for Modern and Future AAA Services. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yongdong Wu, Haixia Yao, Feng Bao 0001 |
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello |
Leveraging Lattices to Improve Role Mining. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Indrajit Ray, Sudip Chakraborty |
Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta |
Managing the lifecycle of XACML delegation policies in federated environments. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Inez Raguenet, Carlos Maziero |
A Fuzzy Model for the Composition of Intrusion Detectors. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Brian Hay, Ronald Dodge, Kara L. Nance |
Using Virtualization to Create and Deploy Computer Security Lab Exercises. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Hoon Wei Lim |
Role Signatures for Access Control in Open Distributed Systems. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yasuhiro Fujihara, Yuko Murayama, Kentarou Yamaguchi |
A user survey on the sense of security, Anshin. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Saraydaryan, Luc Paffumi, Véronique Legrand, Stéphane Ubéda |
Behavioral Intrusion Detection Indicators. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jing Pan, J. I. den Hartog, Erik P. de Vink |
An Operation-Based Metric for CPA Resistance. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Maxwell G. Dondo |
A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kien C. Nguyen, Tansu Alpcan, Tamer Basar |
A Decentralized Bayesian Attack Detection Algorithm for Network Security. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | William J. Caelli |
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Tieyan Li, Guilin Wang |
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, Jens B. Schmitt |
Phishing in the Wireless: Implementation and Analysis. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang |
Crafting Web Counters into Covert Channels. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Rudolph |
Covert Identity Information in Direct Anonymous Attestation (DAA). |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Natsuko Hikage, Yuko Murayama, Carl Hauser |
Exploratory survey on an Evaluation Model for a Sense of Security. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|