default search action
4. WOSIS 2006: Paphos, Cyprus
- Eduardo Fernández-Medina, Mariemma Inmaculada Yagüe del Valle:
Security in Information Systems, Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006. INSTICC Press 2006, ISBN 978-972-8865-52-8 - Manuel Sánchez, Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta:
Grid Authorization Based on Existing AAA Architectures. WOSIS 2006: 3-12 - Sébastien Canard, Fabrice Clerc, Benjamin Morin:
A Secure Universal Loyalty Card. WOSIS 2006: 13-22 - Athanasios Moralis, Angelos Lenis, Mary Grammatikou, Symeon Papavassiliou, Basil S. Maglaris:
A Distributed Kerberized Access Architecture for Real Time Grids. WOSIS 2006: 23-32 - Belén Vela, Eduardo Fernández-Medina, Esperanza Marcos, Mario Piattini:
A Model Driven Approach for Secure XML Database Development. WOSIS 2006: 33-46 - Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak:
SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. WOSIS 2006: 47-57 - Martin Steinebach, Sascha Zmudzinski, Sergey Neichtadt:
Robust-audio-hash Synchronized Audio Watermarking. WOSIS 2006: 58-66 - Eliana Stavrou, Andreas Pitsillides:
Securing Mobile Healthcare Systems Based on Information Classification: DITIS Case Study. WOSIS 2006: 67-79 - Antti Tuomisto, Mikko Savela:
Information Security and Business Continuity in SMEs. WOSIS 2006: 80-90 - Oleksiy Mazhelis, Anton Naumenko:
The Place and Role of Security Patterns in Software Development Process. WOSIS 2006: 91-100 - Serge Chaumette, Achraf Karray, Damien Sauveron:
The Software Infrastructure of a Java Card Based Security Platform for Distributed Applications. WOSIS 2006: 101-114 - Vladimir M. Chernov, Oleg Bespolitov:
A New Method for Embedding Secret Data to the Container Image Using 'Chaotic' Discrete Orthogonal Transforms. WOSIS 2006: 115-124 - Yi Hu, Brajendra Panda:
Modeling Deceptive Action in Virtual Communities. WOSIS 2006: 125-134 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
SREP: A Proposal for Establishing Security Requirements for the Development of Secure Information Systems. WOSIS 2006: 135-145 - Christos K. Dimitriadis:
Honeynets in 3G - A Game Theoretic Analysis. WOSIS 2006: 146-152 - Eva Rodríguez, Silvia Llorente, Jaime Delgado:
Protecting Notification of Events in Multimedia Systems. WOSIS 2006: 153-162 - David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini:
Security Patterns Related to Security Requirements. WOSIS 2006: 163-173 - Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Towards a UML 2.0 Profile for RBAC Modeling in Activity Diagrams. WOSIS 2006: 174-184 - Simone Lupetti, Feike W. Dillema, Tage Stabell-Kulø:
Names in Cryptographic Protocols. WOSIS 2006: 185-194 - William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis:
Secure Deployment of Applications to Fielded Devices and Smart Cards. WOSIS 2006: 195-206 - Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen:
Improving Intrusion Detection through Alert Verification. WOSIS 2006: 207-216 - Miguel A. Martínez, Joaquín Lasheras, José Ambrosio Toval Álvarez, Mario Piattini:
An Audit Method of Personal Data Based on Requirements Engineering. WOSIS 2006: 217-231 - Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:
An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. WOSIS 2006: 232-245 - Charlott Eliasson, Andre Zuquete:
An Electronic Voting System Supporting VoteWeights. WOSIS 2006: 246-255 - Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:
Developing a Maturity Model for Information System Security Management within Small and Medium Size Enterprises. WOSIS 2006: 256-266 - Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera:
Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. WOSIS 2006: 267-277
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.