6. WOSIS 2008:
Barcelona,
Spain
Alfonso Rodríguez, Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina (Eds.):
Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008.
INSTICC Press 2008, ISBN 978-989-8111-44-9 BibTeX
Full Papers
- Ralph Herkenhöner:
Process Modeling for Privacy - Conformant Biobanking: Case Studies on Modeling in UMLsec.
3-12 BibTeX
- Michele Chinosi, Alberto Trombetta:
Integrating Privacy Policies into Business Processes.
13-25 BibTeX
- William M. Fitzgerald, Simon N. Foley, Mícheál Ó Foghlú:
Network Access Control Interoperation using Semantic Web Techniques.
26-37 BibTeX
- Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT.
38-48 BibTeX
- Cameron Ross Dunne, Thibault Candebat, David Gray:
An Access Control Model for Location based Services.
49-58 BibTeX
- Pino Caballero-Gil, Amparo Fúster-Sabater, Maria Eugenia Pazo-Robles:
New Attack Strategy for the Shrinking Generator.
59-67 BibTeX
- Sushmita Ruj, Bimal K. Roy:
Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes.
68-77 BibTeX
- Joaquín Lasheras, Rafael Valencia-García, Jesualdo Tomás Fernández-Breis, José Ambrosio Toval Álvarez:
An Ontology-Based Framework for Modelling Security Requirements.
78-88 BibTeX
- Michael VanHilst, Eduardo B. Fernández, Fabrício A. Braz:
A Multi-Dimensional Classification for Users of Security Patterns.
89-98 BibTeX
- Qutaibah Althebyan, Brajendra Panda:
Knowledge Extraction and Management for Insider Threat Mitigation.
99-110 BibTeX
Short Papers
- Heinz Lothar Grob, Gereon Strauch, Jan Hermans:
Conceptual Design of a Method to Support IS Security Investment Decisions within the Context of Critical Business Processes.
113-121 BibTeX
- Marco Ramilli, Marco Prandini:
Adaptive Filtering of Comment Spam in Multi-user Forums and Blogs.
122-132 BibTeX
- Min-Hua Shao, Shin-Jia Huang:
Trust-Aware Anonymous and Efficient Routing for Mobile Ad-Hoc Networks.
132-137 BibTeX
- Sergio Pozo, Rafael Ceballos, Rafael M. Gasca:
Firewall Rule Set Inconsistency Characterization by Clustering.
138-144 BibTeX
- Koen Buyens, Bart De Win, Wouter Joosen:
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization.
145-150 BibTeX
- Asmaa Adnane, Christophe Bidan, Rafael T. de Sousa Jr.:
Effectiveness of Trust Reasoning for Attack Detection in OLSR.
151-157 BibTeX
Copyright © Sat May 16 23:41:31 2009
by Michael Ley (ley@uni-trier.de)