


default search action
8. WOSIS 2011: Beijing, China
- David Garcia Rosado, Luis Enrique Sánchez, Jan Jürjens:
WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011. SciTePress 2011, ISBN 978-989-8425-61-4
Full Papers
- Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina:
A Comparative Review of Cloud Security Proposals with ISO/IEC 27002. WOSIS 2011: 3-12 - Santiago Moral-García, Santiago Moral-Rubio, Eduardo Fernández-Medina:
Security Pattern Mining: Systematic Review and Proposal. WOSIS 2011: 13-24 - HonGian Karen Lu:
Accessing Cloud through API in a More Secure and Usable Way. WOSIS 2011: 25-38 - Jérôme Dossogne, Stephane Fernandes Medeiros:
Enhancing Cryptographic Code against Side Channel Cryptanalysis with Aspects. WOSIS 2011: 39-48 - Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt:
Expert Assessment on the Probability of Successful Remote Code Execution Attacks. WOSIS 2011: 49-58 - Roberto Ortiz, Santiago Moral-Rubio, Javier Garzás, Eduardo Fernández-Medina:
Towards a Pattern-based Security Methodology to Build Secure Information Systems. WOSIS 2011: 59-69 - Jaime Devesa, Xabier Cantero, Gonzalo Álvarez Marañón, Pablo García Bringas:
An efficient Security Solution for Dealing with Shortened URL Analysis. WOSIS 2011: 70-79 - Alban Gabillon:
A Privacy Model for Social Networks. WOSIS 2011: 80-90 - Jezabel Molina-Gil, Pino Caballero-Gil, Cándido Caballero-Gil:
Enhancing Cooperation in Wireless Vehicular Networks. WOSIS 2011: 91-102 - Haibo Hu, Dan Yang, Hong Xiang, Li Fu, Chunxiao Ye, Ren Li:
Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases. WOSIS 2011: 103-112
Short Papers
- Min-Hua Shao, Yi-Ping Lee, Yen-Fen Hou, Cheng-Yi Ho:
A Trusted Routing Based Service Discovery Protocol with Backup Nodes in MANETs. WOSIS 2011: 115-122 - Sergey Butakov, Craig Barber, Vadim Diagilev, Alexey Mikhailov:
Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student. WOSIS 2011: 123-131 - Ye Hou, Ping Gao, Richard Heeks:
The Influence of Institutional Forces on Employee Compliance with Information Security Policies. WOSIS 2011: 132-141 - Waldo Rocha Flores, Mathias Ekstedt:
Information Security Governance Analysis Using Probabilistic Relational Models. WOSIS 2011: 142-150 - Antonio Santos-Olmo, Luis Enrique Sánchez, Eduardo Fernández-Medina, Mario Piattini:
Desirable Characteristics for an ISMS oriented to SMEs. WOSIS 2011: 151-158 - Angel Gallego, Antonio Santos-Olmo, Luis Enrique Sánchez, Eduardo Fernández-Medina:
Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs. WOSIS 2011: 159-166 - Dina Satybaldina, Altynbek Sharipbayev, Aigul Adamova:
Implementation of the Finite Automaton Public Key Cryptosystem on FPGA. WOSIS 2011: 167-173

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.