3. WOSIS 2005:
Miami,
FL,
USA
Eduardo Fernández-Medina, Julio César Hernández Castro, Luis Javier García Castro (Eds.):
Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, In conjunction with ICEIS2005, Miami, USA, May 2005.
INSTICC Press 2005, ISBN 972-8865-25-2 BibTeX
- Siraj A. Shaikh, Vicky J. Bush:
Analysing the Woo-Lam Protocol Using CSP and Rank Functions.
3-12 BibTeX
- Shuyao Yu, Youkun Zhang, Runguo Ye, Chuck Song:
A Secure Hash-Based Strong-Password Authentication Scheme.
13-20 BibTeX
- H. A. Eneh, Orhan Gemikonakli:
An Approach for the Analysis of Security Standards for Authentication in Distributed Systems.
21-30 BibTeX
- M. Choudary Gorantla, Raju Gangishetti, Manik Lal Das, Ashutosh Saxena:
An Effective Certificateless Signature Scheme Based on Bilinear Pairings.
31-39 BibTeX
- Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
ID-based Serial Multisignature Scheme using Bilinear Pairings.
40-47 BibTeX
- Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng:
Transitive Signatures Based on Bilinear Maps.
48-56 BibTeX
- Robson de Oliveira Albuquerque, Maíra Hanashiro, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, Luis Javier García-Villalba:
MANET - Auto Configuration with Distributed Certification Authority models Considering Routing Protocols Usage.
57-66 BibTeX
- Robson de Oliveira Albuquerque, Daniel Silva Almendra, Leonardo Lobo Pulcineli, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, Luis Javier García-Villalba:
SisBrAV - Brazilian Vulnerability Alert System.
67-76 BibTeX
- Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera:
Honeynet Clusters as an early Warning System for Production Networks.
77-83 BibTeX
- Cláudia J. Barenco Abbas, Alessandra Lafetá, Giuliano Arruda, Luis Javier García-Villalba:
A Honeypot Implementation as Part of the Brazilian Distributed Honeypots Project and Statistical Analysis of Attacks Against a University's Network.
84-93 BibTeX
- Ulf T. Mattsson:
A Real-time Intrusion Prevention System for Commercial Enterprise Databases and File Systems.
94-101 BibTeX
- Jiande Zheng:
Public-Key Encryption Based on Matrix Diagonalization Problem.
102-112 BibTeX
- Guangsen Zhang, Manish Parashar:
Cooperative Defense against Network Attacks.
113-122 BibTeX
- Christos K. Dimitriadis, Despina Polemi:
A Protocol for Incorporating Biometrics in 3G with Respect to Privacy.
123-135 BibTeX
- Vaibhav Gowadia, Csilla Farkas:
Tree Automata for Schema-level Filtering of XML Associations .
136-145 BibTeX
- Chunxiao Ye, Zhongfu Wu, Yunqing Fu:
An Attribute-Based-Delegation-Model and Its Extension.
146-159 BibTeX
- Sabah S. Al-Fedaghi:
A Systematic Approach to Anonymity.
160-172 BibTeX
- Claudine Conrado, Milan Petkovic, Michiel van der Veen, Wytse van der Velde:
Controlled Sharing of Personal Content using Digital Rights Management.
173-185 BibTeX
- Marco Voss, Wolfram Wiesemann:
Using Reputation Systems to Cope with Trust Problems in Virtual Organizations.
186-195 BibTeX
- Yanjun Zuo, Brajendra Panda:
External Object Trust Zone Mapping for Information Clustering.
196-206 BibTeX
- Eduardo B. Fernández, Tami Sorgente, María M. Larrondo-Petrie:
A UML-Based Methodology for Secure Systems: The Design Stage .
207-216 BibTeX
- Rodolfo Villarroel, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Towards a UML 2.0/OCL extension for designing Secure Data Warehouses.
217-228 BibTeX
- Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas:
Secure UML Information Flow using FlowUML.
229-238 BibTeX
- Wes Sonnenreich, Jason Albanese, Bruce Stout:
Return On Security Investment (ROSI): A Practical Quantitative Model.
239-252 BibTeX
- Subhas C. Misra, Vinod Kumar, Uma Kumar:
An Approach for Modeling Information Systems Security Risk Assessment.
253-262 BibTeX
- Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin:
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility.
263-276 BibTeX
- Thuong Doan, Laurent D. Michel, Steven A. Demurjian, T. C. Ting:
Stateful Design for Secure Information Systems.
277-286 BibTeX
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Towards an integration of Security Requirements into Business Process Modeling.
287-297 BibTeX
- Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Towards a Process for Web Services Security.
298-308 BibTeX
- Christine E. Drake, Andrew Klein, Jonathan J. Oliver:
Analysis of the Phishing Email Problem and Discussion of Possible Solutions.
309-318 BibTeX
- Wiebe K. Wiechers, Semir Daskapan:
Validating the Security of Medusa: A survivability Protocol for Security Systems.
319-330 BibTeX
- Serge Chaumette, Damien Sauveron:
An Efficient and Simple Way to Test the Security of Java CardsTM.
331-341 BibTeX
Copyright © Sat May 16 23:41:32 2009
by Michael Ley (ley@uni-trier.de)