default search action
2. WOSIS 2004: Porto, Portugal
- Eduardo Fernández-Medina, Julio César Hernández Castro, L. Javier García-Villalba:
Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004. INSTICC Press 2004, ISBN 972-8865-07-4
Papers
- Ruth Breu, Klaus Burger, Michael Hafner, Gerhard Popp:
Towards a Systematic Development of Secure Systems. WOSIS 2004: 1-12 - Gail-Joon Ahn, Seng-Phil Hong:
Group Hierarchies with Constrained User Assignment in Linux. WOSIS 2004: 13-22 - Christos K. Dimitriadis, Despina Polemi:
Risk Analysis of Biometric Systems. WOSIS 2004: 23-32 - Jan Guynes Clark, Nicole Beebe, Andrew G. Kotulic:
Integrating Security and Privacy Issues in System Design. WOSIS 2004: 33-46 - Juan Manuel Garcia Garcia:
Intrusion Risk Analysis and the Power Law Distribution of Attacks. WOSIS 2004: 47-52 - Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell:
An Efficient Off-Line Reputation Scheme Using Articulated Certificates. WOSIS 2004: 53-62 - Javier Herranz:
A formal proof of security of Zhang and Kim's ID-based ring signature scheme. WOSIS 2004: 63-72 - Marino Tapiador, Juan A. Sigüenza:
B2C Internet Authentication method using Statistical Keystroke Biometrics. WOSIS 2004: 73-78 - Vasilios Katos:
Diffusion Behaviour of Cryptographic Primitives in Feistel Networks. WOSIS 2004: 79-87 - Dorgham Sisalem, Jiri Kuthan:
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments. WOSIS 2004: 88-98 - Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon:
Taxonomy of Trust Relationships in Peer-to-Peer (P2P) Communication. WOSIS 2004: 99-103 - Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
A Secure Prepaid Wireless Micropayment Protocol. WOSIS 2004: 104-113 - Ulf T. Mattsson:
A Practical Implementation of a Real-time Intrusion Prevention System for Commercial Enterprise Databases. WOSIS 2004: 114-125 - Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Efficient Tree Search in Encrypted Data. WOSIS 2004: 126-135 - Yibing Kong, Janusz R. Getta, Ping Yu, Jennifer Seberry:
A Generalized Policy Support System and Its Hierarchy Semantics. WOSIS 2004: 136-145 - Anat Hovav, John D'Arcy:
The Impact of Virus Attack Announcements on the Market Value of Firms. WOSIS 2004: 146-156 - Salem Aljareh, B. Nick Rossiter, Michael A. Heather:
A Formal Security Model for Collaboration in Multi-agency Networks. WOSIS 2004: 157-169 - Christian Tobias:
Security Analysis of MOR using GL(2, R) xThetaZn. WOSIS 2004: 170-179 - Carlos Serrão, Gregor Siegert:
Open Secure Infrastructure to control User Access to multimedia content. WOSIS 2004: 180-185 - Weiliang Zhao, Vijay Varadharajan, George Bryan:
Fair Trading Protocol With Off-line Anonymous Credit Card Payment. WOSIS 2004: 186-195 - Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell:
Private Reputation Schemes for P2P systems. WOSIS 2004: 196-206 - Víctor Méndez Muñoz, Julio César Hernández Castro, Jesús Carretero, Félix García:
Filtering spam at e-mail server level with improved CRM114. WOSIS 2004: 207-216 - Souhila Kaci, Abdeslam Ali-Laouar, Frédéric Cuppens:
Health care and social inference systems: An unauthorized inference control based on fuzzy logic. WOSIS 2004: 217-226 - Ioannis Priggouris, Stathes Hadjiefthymiades, Lazaros F. Merakos:
An XML framework for multi-level access control in the enterprise domain. WOSIS 2004: 227-236 - Erik Zenner:
On the Role of the Inner State Size in Stream Ciphers. WOSIS 2004: 237-250 - Bat-Odon Purevjii, Toshiyuki Amagasa, Sayaka Imai, Yoshinari Kanamori:
An Access Control Model for Geographic Data in an XML -based Framework. WOSIS 2004: 251-260 - Vipul Goyal:
Certificate Revocation Lists or Online Mechanisms. WOSIS 2004: 261-268 - Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Francisco Sánchez-Cid:
Semantic Interoperability of Authorizations. WOSIS 2004: 269-278 - Zouheir Trabelsi, Hamza Rahmani:
Promiscuous Mode Detection Platform. WOSIS 2004: 279-292 - Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Web Services Security: is the problem solved? WOSIS 2004: 293-304 - José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda:
Secure Communications in Multi-Agent Systems Protecting KQML. WOSIS 2004: 305-313 - Ping Lin, K. Selçuk Candan:
Hiding Traversal of Tree Structured Data from Untrusted Data Stores. WOSIS 2004: 314-323 - Arnulfo Ochoa Indart, Jesús Arturo Pérez Díaz:
Analysis of WEP Performance on Mobile Devices. WOSIS 2004: 324-331 - Nimal Nissanke, Etienne J. Khayat:
Risk Based Security Analysis of Permissions in RBAC. WOSIS 2004: 332-341 - Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini:
Towards a Classification of Security Metrics. WOSIS 2004: 342-350 - L. Javier García-Villalba, J. Hamilton Ortiz Monedero, R. Paucar Curasma:
Security in the Management of Networks with SNMPv3. WOSIS 2004: 351-360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.