


default search action
Information Security Technical Report, Volume 6
Volume 6, Number 1, March 2001
- Chez Ciechanowicz:
Introduction. 1 - Perry B. Gentry:
What is a VPN? 15-22 - J. Stuart Broderick:
Implementing Virtual Private Networks in Today's Organization. 23-30 - J. Stuart Broderick:
VPN Security Policy. 31-34 - Neil Dunbar:
IPsec Networking Standards - An Overview. 35-48 - Samantha Donovan, Peter Drabwell, Rae Harbird:
VPNs and Lightweight Clients. 49-64 - William Box, Keith Sterling:
Enabling the User: The VPN in Context. 65-76 - Georgina Schäfer:
Placement of Intelligence Within Networks to Provide Corporate VPN Services. 77-94
Volume 6, Number 2, June 2001
- Chez Ciechanowicz:
Introduction. 1 - Paul J. G. Lothian, Peter Wenham:
Database Security in a Web Environment. 12-20 - Carlo Bellettini
, Elisa Bertino, Elena Ferrari
:
Role Based Access Control Models. 21-29 - Simon R. Wiseman:
Database Security: Retrospective and Way Forward. 30-43 - Elisa Bertino, Barbara Carminati
, Elena Ferrari
:
XML security. 44-58 - Vijay Atluri
:
Security for Workflow Systems. 59-68 - Sushil Jajodia, Duminda Wijesekera:
Security in Federated Database Systems. 69-79 - Mary Ann Davidson:
Security for eBusiness. 80-94 - Bhavani Thuraisingham:
Security for Distributed Databases. 95-102
Volume 6, Number 3, September 2001
- Chez Ciechanowicz:
Introduction. 1 - J. Stuart Broderick:
Information Security Risk Management - When Should It be Managed? 12-18 - Jonathan Tregear:
Risk Assessment. 19-27 - Lech J. Janczewski:
Handling Distributed Denial-of-Service Attacks. 37-44 - Rob Dodson:
Information Incident Management. 45-53 - David Teneyuca:
Organizational Leader's Use Of Risk Management for Information Technology. 54-59 - Paul Williams:
Information Security Governance. 60-70
Volume 6, Number 4, December 2001
- Chez Ciechanowicz:
Introduction. 1 - Andy Nikishin:
Red Alert. 12-17 - Igor Muttik:
Pick'n'mix comparative tests. 18-30 - Sami Rautiainen:
Travelling with Linux malware: Is Linux security for real? 58-64 - Katrin Tocheva:
Worm's Fashion Salon. 65-78 - Sarah Gordon:
The Virus Writer and The Reporter. 79-82

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.