default search action
Information Security Technical Report, Volume 13
Volume 13, Number 1, 2008
- Dieter Gollmann:
Securing Web applications. 1-9 - Francesca Saglietti, Norbert Oster
, Florin Pinte:
White and grey-box verification and validation approaches for safety- and security-critical software systems. 10-16 - John P. McDermott, James Kirby, Bruce E. Montrose, Travis Johnson, Myong H. Kang:
Re-engineering Xen internals for higher-assurance security. 17-24 - Lieven Desmet
, Wouter Joosen, Fabio Massacci
, Pieter Philippaerts
, Frank Piessens, Ida Sri Rejeki Siahaan
, Dries Vanoverberghe:
Security-by-contract on the .NET platform. 25-32 - Brian Chess, Jacob West:
Dynamic taint propagation: Finding vulnerabilities without attacking. 33-39 - Mason Brown, Alan Paller:
Secure software development: Why the development world awoke to the challenge. 40-43
Volume 13, Number 2, May 2008
- Michael J. Ganley:
Introduction to this issue. 45 - Siddhartha Arora:
National e-ID card schemes: A European overview. 46-53 - Danny De Cock, Koen Simoens, Bart Preneel:
Insights on identity documents based on the Belgian case study. 54-60 - Tony Collings:
Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID). 61-70 - Paul de Hert:
Identity management of e-ID, privacy and security in Europe. A human rights view. 71-75 - Thomas Myhr:
Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution: or I am 621216-1318, but I am also 161262-43774. Do you know who I am? 76-82 - Marit Hansen, Andreas Pfitzmann, Sandra Steinbrecher:
Identity management throughout one's whole life. 83-94 - Geraint Price:
The benefits and drawbacks of using electronic identities. 95-103
- John Steer, Ashish Popli:
Building secure business applications at Microsoft. 105-110
Volume 13, Number 3, August 2008
- Allan Tomlinson:
Developments in mobile communications security. 111 - André van Cleeff:
Future consumer mobile phone security: A case study using the data-centric security model. 112-117 - Adrian Leung:
A mobile device management framework for secure service delivery. 118-126 - John A. MacDonald:
Authentication & key agreement for off-portal mobile applications. 127-135 - Rene Mayrhofer
, Hans Gellersen
:
Spontaneous mobile device authentication based on sensor data. 136-150 - Nai-Wei Lo, Kuo-Hui Yeh, Chan Yeob Yeun
:
New mutual agreement protocol to secure mobile RFID-enabled devices. 151-157 - Chan Yeob Yeun
, Kyusuk Han, Duc-Liem Vo, Kwangjo Kim:
Secure authenticated group key agreement protocol in the MANET environment. 158-164 - Christoph Krauß
, Markus Schneider, Claudia Eckert:
On handling insider attacks in wireless sensor networks. 165-172 - Keith Mayes, Konstantinos Markantonakis:
Mobile communication security controllers an evaluation paper. 173-192
Volume 13, Number 4, November 2008
- Lizzie Coles-Kemp:
Introduction. 193-194 - Debi Ashenden
:
Information Security management: A human challenge? 195-201 - Iain Crinson:
Assessing the 'insider-outsider threat' duality in the context of the development of public-private partnerships delivering 'choice' in healthcare services: A sociomaterial critique. 202-206 - Patricia A. H. Williams
:
In a 'trusting' environment, everyone is responsible for information security. 207-215 - Richard E. Overill:
ISMS insider intrusion prevention and detection. 216-219 - Andy Jones:
Catching the malicious insider. 220-224 - Terrence Walker:
Practical management of malicious insider threat - An enterprise CSIRT perspective. 225-234 - Christian W. Probst
, René Rydhof Hansen
:
An extensible analysable system model. 235-246 - Edward Humphreys:
Information security management standards: Compliance, governance and risk management. 247-255
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.