4. WOSIS 2006:
Paphos,
Cyprus
Eduardo Fernández-Medina, Mariemma Inmaculada Yagüe del Valle (Eds.):
Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006.
INSTICC Press 2006, ISBN 978-972-8865-52-8 BibTeX
- Manuel Sánchez, Gabriel López, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta:
Grid Authorization Based on Existing AAA Architectures.
3-12 BibTeX
- Sébastien Canard, Fabrice Clerc, Benjamin Morin:
A Secure Universal Loyalty Card.
13-22 BibTeX
- A. Moralis, Angelos Lenis, Mary Grammatikou, Symeon Papavassiliou, Basil S. Maglaris:
A Distributed Kerberized Access Architecture for Real Time Grids.
23-32 BibTeX
- Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini:
A Model Driven Approach for Secure XML Database Development.
33-46 BibTeX
- Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak:
SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows.
47-57 BibTeX
- Martin Steinebach, Sascha Zmudzinski, Sergey Neichtadt:
Robust-audio-hash Synchronized Audio Watermarking.
58-66 BibTeX
- Eliana Stavrou, Andreas Pitsillides:
Securing Mobile Healthcare Systems Based on Information Classification: DITIS Case Study.
67-79 BibTeX
- Antti Tuomisto, Mikko Savela:
Information Security and Business Continuity in SMEs.
80-90 BibTeX
- Oleksiy Mazhelis, Anton Naumenko:
The Place and Role of Security Patterns in Software Development Process.
91-100 BibTeX
- Serge Chaumette, Achraf Karray, Damien Sauveron:
The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications.
101-114 BibTeX
- Vladimir M. Chernov, Oleg Bespolitov:
A New Method for Embedding Secret Data to the Container Image Using 'Chaotic' Discrete Orthogonal Transforms.
115-124 BibTeX
- Yi Hu, Brajendra Panda:
Modeling Deceptive Action in Virtual Communities.
125-134 BibTeX
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems.
135-145 BibTeX
- Christos K. Dimitriadis:
Honeynets in 3G - A Game Theoretic Analysis.
146-152 BibTeX
- Eva Rodríguez, Silvia Llorente, Jaime Delgado:
Protecting Notification of Events in Multimedia Systems.
153-162 BibTeX
- David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Security Patterns Related to Security Requirements.
163-173 BibTeX
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams.
174-184 BibTeX
- Simone Lupetti, Feike W. Dillema, Tage Stabell-Kulø:
Names in Cryptographic Protocols.
185-194 BibTeX
- William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis:
Secure Deployment of Applications to Fielded Devices and Smart Cards.
195-206 BibTeX
- Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen:
Improving Intrusion Detection through Alert Verification.
207-216 BibTeX
- Miguel A. Martínez, Joaquín Lasheras, José Ambrosio Toval Álvarez, Mario Piattini:
An Audit Method of Personal Data Based on Requirements Engineering.
217-231 BibTeX
- Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:
An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks.
232-245 BibTeX
- Charlott Eliasson, Andre Zuquete:
An Electronic Voting System Supporting VoteWeights.
246-255 BibTeX
- Luís Enrique Sanchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:
Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises.
256-266 BibTeX
- Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera:
Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords.
267-277 BibTeX
Copyright © Sat May 16 23:41:32 2009
by Michael Ley (ley@uni-trier.de)