- 2008
- Siddhartha Arora:
National e-ID card schemes: A European overview. Inf. Secur. Tech. Rep. 13(2): 46-53 (2008) - Debi Ashenden:
Information Security management: A human challenge? Inf. Secur. Tech. Rep. 13(4): 195-201 (2008) - Mason Brown, Alan Paller:
Secure software development: Why the development world awoke to the challenge. Inf. Secur. Tech. Rep. 13(1): 40-43 (2008) - Brian Chess, Jacob West:
Dynamic taint propagation: Finding vulnerabilities without attacking. Inf. Secur. Tech. Rep. 13(1): 33-39 (2008) - André van Cleeff:
Future consumer mobile phone security: A case study using the data-centric security model. Inf. Secur. Tech. Rep. 13(3): 112-117 (2008) - Danny De Cock, Koen Simoens, Bart Preneel:
Insights on identity documents based on the Belgian case study. Inf. Secur. Tech. Rep. 13(2): 54-60 (2008) - Lizzie Coles-Kemp:
Introduction. Inf. Secur. Tech. Rep. 13(4): 193-194 (2008) - Tony Collings:
Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID). Inf. Secur. Tech. Rep. 13(2): 61-70 (2008) - Iain Crinson:
Assessing the 'insider-outsider threat' duality in the context of the development of public-private partnerships delivering 'choice' in healthcare services: A sociomaterial critique. Inf. Secur. Tech. Rep. 13(4): 202-206 (2008) - Lieven Desmet, Wouter Joosen, Fabio Massacci, Pieter Philippaerts, Frank Piessens, Ida Sri Rejeki Siahaan, Dries Vanoverberghe:
Security-by-contract on the .NET platform. Inf. Secur. Tech. Rep. 13(1): 25-32 (2008) - Michael J. Ganley:
Introduction to this issue. Inf. Secur. Tech. Rep. 13(2): 45 (2008) - Dieter Gollmann:
Securing Web applications. Inf. Secur. Tech. Rep. 13(1): 1-9 (2008) - Marit Hansen, Andreas Pfitzmann, Sandra Steinbrecher:
Identity management throughout one's whole life. Inf. Secur. Tech. Rep. 13(2): 83-94 (2008) - Paul de Hert:
Identity management of e-ID, privacy and security in Europe. A human rights view. Inf. Secur. Tech. Rep. 13(2): 71-75 (2008) - Edward Humphreys:
Information security management standards: Compliance, governance and risk management. Inf. Secur. Tech. Rep. 13(4): 247-255 (2008) - Andy Jones:
Catching the malicious insider. Inf. Secur. Tech. Rep. 13(4): 220-224 (2008) - Christoph Krauß, Markus Schneider, Claudia Eckert:
On handling insider attacks in wireless sensor networks. Inf. Secur. Tech. Rep. 13(3): 165-172 (2008) - Adrian Leung:
A mobile device management framework for secure service delivery. Inf. Secur. Tech. Rep. 13(3): 118-126 (2008) - Nai-Wei Lo, Kuo-Hui Yeh, Chan Yeob Yeun:
New mutual agreement protocol to secure mobile RFID-enabled devices. Inf. Secur. Tech. Rep. 13(3): 151-157 (2008) - John A. MacDonald:
Authentication & key agreement for off-portal mobile applications. Inf. Secur. Tech. Rep. 13(3): 127-135 (2008) - Keith Mayes, Konstantinos Markantonakis:
Mobile communication security controllers an evaluation paper. Inf. Secur. Tech. Rep. 13(3): 173-192 (2008) - Rene Mayrhofer, Hans Gellersen:
Spontaneous mobile device authentication based on sensor data. Inf. Secur. Tech. Rep. 13(3): 136-150 (2008) - John P. McDermott, James Kirby, Bruce E. Montrose, Travis Johnson, Myong H. Kang:
Re-engineering Xen internals for higher-assurance security. Inf. Secur. Tech. Rep. 13(1): 17-24 (2008) - Thomas Myhr:
Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution: or I am 621216-1318, but I am also 161262-43774. Do you know who I am? Inf. Secur. Tech. Rep. 13(2): 76-82 (2008) - Richard E. Overill:
ISMS insider intrusion prevention and detection. Inf. Secur. Tech. Rep. 13(4): 216-219 (2008) - Geraint Price:
The benefits and drawbacks of using electronic identities. Inf. Secur. Tech. Rep. 13(2): 95-103 (2008) - Christian W. Probst, René Rydhof Hansen:
An extensible analysable system model. Inf. Secur. Tech. Rep. 13(4): 235-246 (2008) - Francesca Saglietti, Norbert Oster, Florin Pinte:
White and grey-box verification and validation approaches for safety- and security-critical software systems. Inf. Secur. Tech. Rep. 13(1): 10-16 (2008) - John Steer, Ashish Popli:
Building secure business applications at Microsoft. Inf. Secur. Tech. Rep. 13(2): 105-110 (2008) - Allan Tomlinson:
Developments in mobile communications security. Inf. Secur. Tech. Rep. 13(3): 111 (2008)