default search action
Information Security Technical Report, Volume 10
Volume 10, Number 1, 2005
- Jason Crampton:
Introduction to February 2005 issue of ISTR. 1 - Konstantin Beznosov, Donald J. Flinn, Shirley Kawamoto, Bret Hartman:
Introduction to Web services and their security. 2-14 - Christian Geuer-Pollmann, Joris Claessens:
Web services and web service security standards. 15-24 - Allan MacPhee, Mark O'Neill:
Notes from the field: Implementing a security solution for Web Services. 25-32 - David W. Chadwick:
Authorisation in Grid computing. 33-40 - Paul Kearney:
Message level security for web services. 41-50 - Grit Denker, Lalana Kagal, Tim Finin:
Security in the Semantic Web using OWL. 51-58
Volume 10, Number 2, 2005
- Brian Berger:
Trusted computing group history. 59-62 - G. Edward Suh, Charles W. O'Donnell, Srinivas Devadas:
AEGIS: A single-chip secure processor. 63-73 - David Safford, Mimi Zohar:
Trusted computing and open source. 74-82 - Ahmad-Reza Sadeghi, Christian Stüble:
Towards multilaterally secure computing platforms - with open source and trusted computing. 83-95 - Carlin R. Covey, Mark D. Redman, Thomas E. Tkacik:
An Advanced Trusted Platform for mobile phone devices. 96-104 - Seth D. Schoen:
Compatibility, competition, and control in trusted computing environments. 105-119 - Geoffrey Strongin:
Trusted computing using AMD "Pacifica" and "Presidio" secure virtual machine technology. 120-132
Volume 10, Number 3, 2005
- Michael J. Ganley:
Introduction - Intrusion detection and prevention. 133 - Andreas Fuchsberger:
Intrusion Detection Systems and Intrusion Prevention Systems. 134-139 - Brian Hernacki, Jeremy Bennett, James A. Hoagland:
An overview of network evasion methods. 140-149 - Maria Papadaki, Steven M. Furnell:
Informing the decision process in an automated intrusion response system. 150-161 - Next-generation intrusion prevention: Accounting for the attack timeline. 162-168
- Tadeusz Pietraszek, Axel Tanner:
Data mining and machine learning - Towards reducing false positives in intrusion detection. 169-183
Volume 10, Number 4, 2005
- Geraint Price:
Editorial: "The security perimeter". 185 - David Lacey:
Inventing the future - The vision of the Jericho Forum. 186-188 - Graham Palmer:
De-Perimeterisation: Benefits and limitations. 189-203 - J. Stuart Broderick:
Firewalls - Are they enough protection for current networks? 204-212 - Gerhard Eschelbeck:
The Laws of Vulnerabilities: Which security vulnerabilities really matter? 213-219 - John Walker:
The extended security perimeter. 220-227 - Mark Curphey:
Web services: Developers dream or hackers heaven? 228-235 - Phil Cracknell:
Why 'Phish' when you can Trawl? 236-239
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.