default search action
5. WOSIS 2007: Funchal, Madeira, Portugal
- Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina:
Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007. INSTICC Press 2007, ISBN 978-972-8865-96-2
Invited Speaker
- Ruth Breu:
Model-Driven Approaches to Security. WOSIS 2007: 3
Security Services
Full Papers
- Anna Zych, Milan Petkovic, Willem Jonker:
A Key Management Method for Cryptographically Enforced Access Control. WOSIS 2007: 9-22 - Manuel Sáchez Cuenca, Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta:
A Proposal for Extending the Eduroam Infrastructure with Authorization Mechanisms. WOSIS 2007: 23-32 - Florian Kerschbaum:
A New Way to Think About Secure Computation: Language-based Secure Computation. WOSIS 2007: 33-42 - Marco Ramilli, Marco Prandini:
RoboAdmin: A Different Approach to Remote System Administration. WOSIS 2007: 43-52 - Omid Tafreschi, Dominique Maehler, Janina Fengel, Michael Rebstock, Claudia Eckert:
A Reputation System for Electronic Negotiations. WOSIS 2007: 53-62 - Berthold Agreiter, Michael Hafner, Ruth Breu:
A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. WOSIS 2007: 63-72 - Rui Guo, Guiran Chang, Ruidong Hou, Baojing Sun, An Liu, Bencheng Zhang:
Research on Counter Http DDoS Attacks based on Weighted Queue Random Early Drop . WOSIS 2007: 73-81 - Barry Sweeney, Duminda Wijesekera:
Comparison of IPsec to TLS and SRTP for Securing VoIP. WOSIS 2007: 82-92
Short Papers
- Katalin Anna Lázá, Csilla Farkas:
Security in TciNMP Systems. WOSIS 2007: 95-104 - Marco Prandini, Eugenio Faldella, Roberto Laschi:
Confining the Insider Threat in Mass Virtual Hosting Systems. WOSIS 2007: 105-114 - Ernesto Damiani, Majirus Fansi, Alban Gabillon, Stefania Marrara:
A General Approach to Securely Querying XML. WOSIS 2007: 115-122 - Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
New Primitives to AOP Weaving Capabilities for Security Hardening Concerns. WOSIS 2007: 123-130
Privacy and DRM
Full Papers
- Reine Lundin, Thijs Holleboom, Stefan Lindskog:
On the Relationship between Confidentiality Measures: Entropy and Guesswork. WOSIS 2007: 135-144 - Klaus Plößl, Hannes Federrath:
A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. WOSIS 2007: 145-154 - Gerardo Canfora, Corrado Aaron Visaggio:
A Three Layered Model to Implement Data Privacy Policies. WOSIS 2007: 155-165 - Silvia Llorente, Jaime Delgado, Xavier Maroñas:
Implementing Mobile DRM with MPEG 21 and OMA. WOSIS 2007: 166-175
Short Papers
- Stefan Böttcher:
Inferring Secret Information in Relational Databases. WOSIS 2007: 179-187 - Daniel Kadenbach, Carsten Kleiner, Lukas Grittner:
A DRM Architecture for Securing User Privacy by Design. WOSIS 2007: 188-195 - Víctor Rodríguez-Doncel, Marc Gauvin, Jaime Delgado:
An Ontology for the Expression of Intellectual Property Entities and Relations. WOSIS 2007: 196-203
Security Engineering
Full Papers
- Alfonso Rodríguez, Ignacio García Rodríguez de Guzmán:
Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA Approach. WOSIS 2007: 209-219 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
SREPPLine: Towards a Security Requirements Engineering Process for Software Product Lines. WOSIS 2007: 220-232 - Luis Enrique Sánchez, Daniel Villafranca, Mario Piattini:
MMISS-SME Practical Development: Maturity Model for Information Systems Security Management in SMEs. WOSIS 2007: 233-244 - Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
SECRDW: An Extension of the Relational Package from CWM for Representing Secure Data Warehouses at the Logical Level. WOSIS 2007: 245-256
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.