default search action
International Journal of Information and Computer Security, Volume 1
Volume 1, Numbers 1/2, 2007
- Maria Luisa Damiani, Elisa Bertino, Paolo Perlasca:
Data security in location-aware applications: an approach based on RBAC. 5-38 - Robert Johnson, Jessica Staddon:
Deflation-secure web metering. 39-63 - Sarath Indrakanti, Vijay Varadharajan, Ritesh Agarwal:
On the design, implementation and application of an authorisation architecture for web services. 64-108 - Guy G. Helmer, Johnny Wong, Mark Slagell, Vasant G. Honavar, Les Miller, Yanxin Wang, Xia Wang, Natalia Stakhanova:
Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems. 109-142 - Vijayalakshmi Atluri, Soon Ae Chun:
A geotemporal role-based authorisation system. 143-168 - Natalia Stakhanova, Samik Basu, Johnny Wong:
A taxonomy of intrusion response systems. 169-184 - Lili Yang, Shuang-Hua Yang:
A framework of security and safety checking for internet-based control systems. 185-200 - Ya-Fen Chang, Chin-Chen Chang:
An RSA-based (t, n) threshold proxy signature scheme with freewill identities. 201-209 - Khidir M. Ali, Thomas J. Owens:
Selection of an EAP authentication method for a WLAN. 210-233
Volume 1, Number 3, 2007
- Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Accountability in organisations. 237-255 - Zhen Yu, William Sears, Yong Guan:
PeerCredential: a reputation-based trust framework for Peer-to-Peer applications. 256-277 - Asad Amir Pirzada, Chris McDonald:
Collaborative Dynamic Source Routing using transitional trust filters. 278-297 - Lalit Kumar Awasthi, Prashant Kumar:
A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach. 298-314 - Alex Hai Wang, Peng Liu, Lunquan Li:
Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies. 315-340 - Suleyman Kondakci:
A new assessment and improvement model of risk propagation in information security. 341-366
Volume 1, Number 4, 2007
- William Hutchinson:
An information-centric and proactive approach to Information Security teaching. 369-377 - Graeme Pye, Matthew J. Warren:
E-business security benchmarking: a model and framework. 378-390 - Christopher Bolan:
Radio Frequency Identification: a review of low cost tag security proposals. 391-399 - Wayne A. Jansen, Serban I. Gavrila, Clément Séveillac:
Smart Cards for mobile devices. 400-413 - Patricia A. H. Williams:
Medical data security: Are you informed or afraid? 414-429 - Craig Valli:
Honeypot technologies and their applicability as a strategic internal countermeasure. 430-436 - Timon C. Du, Eldon Y. Li, Jacqueline W. Wong:
Document access control in organisational workflows. 437-454 - Chiou-Pirng Wang, Don Snyder, Kathaleena Monds:
A conceptual framework for curbing the epidemic of information malice: e-hygiene model with a human-factor approach. 455-465
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.