default search action
Information Systems Security, Volume 13
Volume 13, Number 1, 2004
- Ken Dunham:
Why SoBig Is So Big. 2-7 - Edward H. Freeman:
Source Code Escrow. 8-11 - Nick Akerman:
Protecting Yourself While Protecting Your Computer Data: Two Laws Make It More Important than Ever. 12-17 - Sumit Ghosh:
The Nature of Cyber-attacks in the Future: A Position Paper. 18-33 - Candelaria Hernández-Goya, Pino Caballero-Gil:
A New Role of Graph Theory: The Design of Probably Secure Cryptoprotocols. 34-43 - Thomas R. Peltier:
Developing an Enterprisewide Policy Structure. 44-50 - Laurence J. Wolf:
Preventing Failure: The Value of Performing a Single Point of Failure Analysis for Critical Applications and Systems. 51-54
Volume 13, Number 2, 2004
- Ken Dunham:
Phishing Isn't So Sophisticated: Scary! 2-7 - Edward H. Freeman:
Digital Signatures and Electronic Contracts. 8-12 - Anton Chuvakin:
Security Event Analysis through Correlation. 13-18 - Douglas G. Conorich:
Monitoring Intrusion Detection Systems: From Data to Knowledge. 19-30 - Alec Main:
Application Security: Building in Security during the Development Stage. 31-37 - Louisa Saunier:
The Twelve Principles of Trusted Solutions. 38-45 - Alyson E. Beacham, Denise Johnson McManus:
Recovery of Financial Services Firms in the World Trade Center, Post 9/11/01. 46-55
Volume 13, Number 3, 2004
- Ruth Breu, Klaus Burger, Michael Hafner, Gerhard Popp:
Towards a Systematic Development of Secure Systems. 5-13 - Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Efficient Tree Search in Encrypted Data. 14-21 - Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Web Services Security: Is the Problem Solved? 22-31 - Anat Hovav, John D'Arcy:
The Impact of Virus Attack Announcements on the Market Value of Firms. 32-40 - Weiliang Zhao, Vijay Varadharajan, George Bryan:
Fair Trading Protocol with Offline Anonymous Credit Card Payment. 41-47 - Víctor Méndez Muñoz, Julio César Hernández Castro, Jesús Carretero, Félix García:
Filtering Spam at E-Mail Server Level with Improved CRM114. 48-55
Volume 13, Number 4, 2004
- Ken Dunham:
Mydoom Miseries. 2-5 - Edward H. Freeman:
Corporate Liability for Illegal Downloading of Copyrighted Music. 6-10 - Peter Stephenson:
Forensic Analysis of Risks in Enterprise Systems. 11-21 - Patricia Ferson:
I'll Take an Order of Data Sensitivity with Some Integrity on the Side: Finding a Balance within Access Control Models. 22-25 - Martin Nemzow:
Creating and Implementing MS Office Security. 26-38 - J. Thomas, Adam J. Elbirt:
Understanding Internet Protocol Security. 39-43 - Thomas R. Peltier:
Risk Analysis and Risk Management. 44-56
Volume 13, Number 5, 2004
- Richard O'Hanley:
Maintaining Security and Privacy Requires Getting "Back to Basics". 2-3 - Edward H. Freeman:
Document Theft: Appropriate Responses. 4-8 - Laurence J. Wolf:
Can You Handle the Headaches? Analyzing and Optimizing the Effectiveness of the Incident Management Process. 9-20 - Brian T. Geffert:
Incorporating HIPAA Security Requirements into an Enterprise Security Program. 21-28 - Russell L. Jones, Abhinav Rastogi:
Secure Coding: Building Security into the Software Development Life Cycle. 29-39 - Raju Mehta:
Oracle Database Security. 40-52
Volume 13, Number 6, 2005
- Richard O'Hanley:
Spyware, Adware, Malware - It's All Sleazeware to Me. 2-4 - Edward H. Freeman:
Data Protection and the Commerce Clause. 5-9 - Ken Dunham:
The Power of Intelligence. 10-14 - Adarbad Master:
Digital Identities Can Tame the Wild, Wild Web. 15-22 - Zouheir Trabelsi, Hamza Rahmani:
An Anti-Sniffer Based on ARP Cache Poisoning Attack. 23-36 - Steven Drew:
Reducing Enterprise Risk with Effective Threat Management. 37-42 - Andrew Tinseth, Dan Richlin:
SB1386: One Year Later. 43-50 - Amir M. Hormozi:
Cookies and Privacy. 51-59
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.