2. WOSIS 2004:
Porto,
Portugal
Eduardo Fernández-Medina, Julio César Hernández Castro, L. Javier García-Villalba (Eds.):
Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004.
INSTICC Press 2004, ISBN 972-8865-07-4 BibTeX
@proceedings{DBLP:conf/sis/2004,
editor = {Eduardo Fern{\'a}ndez-Medina and
Julio C{\'e}sar Hern{\'a}ndez Castro and
L. Javier Garc\'{\i}a-Villalba},
title = {Security In Information Systems, Proceedings of the 2nd International
Workshop on Security In Information Systems, WOSIS 2004, In conjunction
with ICEIS 2004, Porto, Portugal, April 2004},
booktitle = {WOSIS},
publisher = {INSTICC Press},
year = {2004},
isbn = {972-8865-07-4},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Papers
- Ruth Breu, Klaus Burger, Michael Hafner, Gerhard Popp:
Towards a Systematic Development of Secure Systems.
1-12 BibTeX
- Gail-Joon Ahn, Seng-Phil Hong:
Group Hierarchies with Constrained User Assignment in Linux.
13-22 BibTeX
- Christos K. Dimitriadis, Despina Polemi:
Risk Analysis of Biometric Systems.
23-32 BibTeX
- Jan Guynes Clark, Nicole Beebe, Andrew G. Kotulic:
Integrating Security and Privacy Issues in System Design.
33-46 BibTeX
- Juan Manuel Garcia Garcia:
Intrusion Risk Analysis and the Power Law Distribution of Attacks.
47-52 BibTeX
- Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell:
An Efficient Off-Line Reputation Scheme Using Articulated Certificates.
53-62 BibTeX
- Javier Herranz:
A formal proof of security of Zhang and Kim's ID-based ring signature scheme.
63-72 BibTeX
- Marino Tapiador, Juan A. Sigüenza:
B2C Internet Authentication method using Statistical Keystroke Biometrics.
73-78 BibTeX
- Vasilios Katos:
Diffusion Behaviour of Cryptographic Primitives in Feistel Networks.
79-87 BibTeX
- Dorgham Sisalem, Jiri Kuthan:
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments.
88-98 BibTeX
- Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon:
Taxonomy of Trust Relationships in Peer-to-Peer (P2P) Communication.
99-103 BibTeX
- Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
A Secure Prepaid Wireless Micropayment Protocol.
104-113 BibTeX
- Ulf T. Mattsson:
A Practical Implementation of a Real-time Intrusion Prevention System for Commercial Enterprise Databases.
114-125 BibTeX
- Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Efficient Tree Search in Encrypted Data.
126-135 BibTeX
- Yibing Kong, Janusz R. Getta, Ping Yu, Jennifer Seberry:
A Generalized Policy Support System and Its Hierarchy Semantics.
136-145 BibTeX
- Anat Hovav, John D'Arcy:
The Impact of Virus Attack Announcements on the Market Value of Firms.
146-156 BibTeX
- Salem Aljareh, B. Nick Rossiter, Michael A. Heather:
A Formal Security Model for Collaboration in Multi-agency Networks.
157-169 BibTeX
- Christian Tobias:
Security Analysis of MOR using GL(2, R) xThetaZn.
170-179 BibTeX
- Carlos Serrão, Gregor Siegert:
Open Secure Infrastructure to control User Access to multimedia content.
180-185 BibTeX
- Weiliang Zhao, Vijay Varadharajan, George Bryan:
Fair Trading Protocol With Off-line Anonymous Credit Card Payment.
186-195 BibTeX
- Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell:
Private Reputation Schemes for P2P systems.
196-206 BibTeX
- Víctor Méndez Muñoz, Julio César Hernández Castro, Jesús Carretero, Félix García:
Filtering spam at e-mail server level with improved CRM114.
207-216 BibTeX
- Souhila Kaci, Abdeslam Ali-Laouar, Frédéric Cuppens:
Health care and social inference systems: An unauthorized inference control based on fuzzy logic.
217-226 BibTeX
- Ioannis Priggouris, Stathes Hadjiefthymiades, Lazaros F. Merakos:
An XML framework for multi-level access control in the enterprise domain.
227-236 BibTeX
- Erik Zenner:
On the Role of the Inner State Size in Stream Ciphers.
237-250 BibTeX
- Bat-Odon Purevjii, Toshiyuki Amagasa, Sayaka Imai, Yoshinari Kanamori:
An Access Control Model for Geographic Data in an XML -based Framework.
251-260 BibTeX
- Vipul Goyal:
Certificate Revocation Lists or Online Mechanisms.
261-268 BibTeX
- Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Francisco Sanchez:
Semantic Interoperability of Authorizations.
269-278 BibTeX
- Zouheir Trabelsi, Hamza Rahmani:
Promiscuous Mode Detection Platform.
279-292 BibTeX
- Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Web Services Security: is the problem solved?
293-304 BibTeX
- José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda:
Secure Communications in Multi-Agent Systems Protecting KQML.
305-313 BibTeX
- Ping Lin, K. Selçuk Candan:
Hiding Traversal of Tree Structured Data from Untrusted Data Stores.
314-323 BibTeX
- Arnulfo Ochoa Indart, Jesús Arturo Pérez Díaz:
Analysis of WEP Performance on Mobile Devices.
324-331 BibTeX
- Nimal Nissanke, Etienne J. Khayat:
Risk Based Security Analysis of Permissions in RBAC.
332-341 BibTeX
- Carlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini:
Towards a Classification of Security Metrics.
342-350 BibTeX
- L. Javier García-Villalba, J. Hamilton Ortiz Monedero, R. Paucar Curasma:
Security in the Management of Networks with SNMPv3.
351-360 BibTeX
Copyright © Sat May 16 23:41:32 2009
by Michael Ley (ley@uni-trier.de)