default search action
Information Security Technical Report, Volume 9
Volume 9, Number 1, January - March 2004
- Scarlet Schwiderski-Grosche:
Introduction. 5 - Mike Small:
Business and technical motivation for identity management. 6-21 - Geoff Brown:
The use of hardware tokens for identity management. 22-25 - Rolf Oppliger:
Microsoft .NET Passport and identity management. 26-34 - Marit Hansen, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, Michael Waidner:
Privacy-enhancing identity management. 35-44 - Birgit Pfitzmann:
Privacy in enterprise identity federation - policies for Liberty 2 single sign on. 45-58 - Yuri Demchenko:
Virtual organisations in computer grids and identity management. 59-76 - Kai Rannenberg:
Identity management in mobile cellular networks and related applications. 77-85 - Gavenraj Sodhi:
User provisioning with SPML. 86-96
Volume 9, Number 2, April - June 2004
- Michael J. Ganley:
Introduction. 5 - Andrey Nikishin:
Malicious software - past, present and future. 6-18 - Richard Ford:
The future of virus detection. 19-26 - David Williamson:
Deconstructing malware: what it is and how to stop it. 27-34 - Joe Stewart:
This business of malware. 35-41 - Sami Rautiainen:
Sound of silence. 42-46 - Jay G. Heiser:
Understanding today's malware. 47-64 - Shaun Fothergill:
Business issues relating to malware. 65-75
Volume 9, Number 3, July - September 2004
- Jason Crampton:
Introduction. 5 - Berin Lautenbach:
Introduction to XML Encryption and XML Signature. 6-18 - Elisa Bertino, Barbara Carminati, Elena Ferrari:
Access control for XML documents and data. 19-34 - Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
XML-based access control languages. 35-46 - Renato Iannella:
The Open Digital Rights Language: XML for Digital Rights Management. 47-55 - Paul Madsen:
Federated identity and web services. 56-65 - Peter Michalek:
Dissecting application security XML schemas: AVDL, WAS, OVAL - state of the XML security standards report. 66-76
Volume 9, Number 4, December 2004
- Scarlet Schwiderski-Grosche:
Introduction. 5 - Thomas Walter, Laurent Bussard, Yves Roudier, Jochen Haller, Roger Kilian-Kehr, Joachim Posegga, Philip Robinson:
Secure mobile business applications - framework, architecture and implementation. 6-21 - James Irwin:
Digital Rights Management: The Open Mobile Alliance DRM specifications. 22-31 - Valtteri Niemi:
Trends in mobile security standards. 32-38 - Heiko Knospe, Hartmut Pohl:
RFID security. 39-50 - Derek Babb:
User requirements for security in wireless mobile systems. 51-59 - Terence E. Dodgson:
Mobile terminal security and tracking. 60-80
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.