Volume 31,
2003
- Derrick G. Kourie:
Editorial.
1-1 BibTeX
- Jason Crampton, Hemanth Khambhammettu:
Access control in a distributed object environment using XML and roles.
2-8 BibTeX
- Nanjangud C. Narendra:
AdaptAgent : integrated architecture for adaptive workflow and agents.
9-17 BibTeX
- E. Smith, Mariki M. Eloff, Lucas M. Venter, A. Barnard, Laurette Pretorius:
Agents, security and ethics : a framework for analysis.
18-24 BibTeX
- S. A. Lukell, A. C. M. Hutchison:
Attack analysis of cryptographic protocols using strand spaces.
25-32 BibTeX
- L. Coetzlee, Elizabeth C. Botha:
Empirical results of an image-based automated vehicle identification system.
33-39 BibTeX
- H. S. Venter, Jan H. P. Eloff:
Evaluating vulnerability scanners using harmonised vulnerability categories.
40-45 BibTeX
- Thomas Schlienger, Stephanie Teufel:
Information security culture - from analysis to change.
46-52 BibTeX
- M. S. Olivier:
A layered architecture for privacy - enhancing technologies.
53-61 BibTeX
- H. Pham, Z. Jiang:
Spam control via a distributed scheme of merit accumulation.
62-69 BibTeX
Copyright © Sun May 17 00:18:22 2009
by Michael Ley (ley@uni-trier.de)