Conferences in DBLP
Alan K. Stanley Information security - challenges for the next millennium. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:3-8 [Conf ] C. P. Louwrens , Sebastiaan H. von Solms Selection of secure single sign-on solutions for heterogeneous computing environments. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:9-24 [Conf ] Jussipekka Leiwo , Yuliang Zheng A formal model to aid documenting and harmonizing of information security requirements. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:25-38 [Conf ] Masha Gendler-Fishman , Ehud Gudes A compile-time model for safe information flow in object-oriented databases. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:41-55 [Conf ] Silvana Castano , Maria Grazia Fugini Deriving Authorizations from Process Analysis in Legacy Information Systems. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:56-67 [Conf ] Mads Bryde Andersen The role of government in creating the IT security infrastructure: builder or bystander? [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:71-77 [Conf ] Lam-for Kwok , Dennis Longley Code of Practice: A Standard for Information Security Management. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:78-90 [Conf ] Rossouw von Solms Can security baselines replace risk analysis? [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:91-98 [Conf ] Andrew Hutchison gGSS-API: a group enhanced generic security service. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:101-110 [Conf ] Per Furberg Electronic document exchange in Sweden - the legal aspects. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:113-119 [Conf ] Ioanna Kantzavelou , Sokratis K. Katsikas An attack detection system for secure computer systems - outline of the solution. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:123-135 [Conf ] Erland Jonsson , Lech J. Janczewski A taxonomy and overview of information security experiments. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:139-150 [Conf ] Michael Sobirey , Simone Fischer-Hübner , Kai Rannenberg Pseudonymous audit for privacy enhanced intrusion detection. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:151-163 [Conf ] Martin Reichenbach , Herbert Damker , Hannes Federrath , Kai Rannenberg Individual management of personal reachability in mobile communication. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:164-174 [Conf ] Willis H. Ware New vistas on info-system security. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:177-196 [Conf ] R. Kruger , Jan H. P. Eloff A common criteria framework for the evaluation of information technology systems security. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:197-209 [Conf ] Jan H. P. Eloff , R. Körner A methodology for accrediting a commercial distributed database. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:210-221 [Conf ] A. van Rensburg , Sebastiaan H. von Solms A comparison of schemes for certification authorities/trusted third parties. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:222-240 [Conf ] Audun Jøsang , F. Van Laenen , Svein J. Knapskog , Joos Vandewalle How to trust systems. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:241-252 [Conf ] O. Tettero , D. J. Out , Henry M. Franken , J. Schot Integrating information security in the development of telematics systems. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:255-266 [Conf ] Claudia Eckert , D. Marek Developing secure applications: a systematic approach. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:267-279 [Conf ] W. Olivier , Helen van de Haar Controlling Internet access at an educational institution. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:280-292 [Conf ] Klaus Brunnstein Analysis of Java security and hostile applets. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:293-295 [Conf ] Richard Baskerville New organizational forms for information security management. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:296-307 [Conf ] Edo Roos Lindgreen , H. R. D. Janus , A. Shahim , G. Hulst , I. S. Herschberg Security when outsourcing: concepts, constructs, compliance. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:308-318 [Conf ] The IFIP TC11 position on cryptopolicies. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:321-322 [Conf ] Klaus Brunnstein Towards a holistic view of security and safety of enterprise information and communication technologies: adapting to a changing paradigm. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:325-336 [Conf ] Ernest Foo , Colin Boyd , William J. Caelli , Ed Dawson A taxonomy of electronic cash schemes. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:337-348 [Conf ] Andreu Riera , Joan Borrell , Josep Rifà Large scale elections by coordinating electoral colleges. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:349-362 [Conf ] Claudia Eckert , Th. Stoesslein MVS-SAT: a security administration tool to support SMF protocol data evaluation. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:363-374 [Conf ] Bernd Blobel Security requirements and solutions in distributed electronic health records. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:377-390 [Conf ] Matthew J. Warren , Steven Furnell , Peter W. Sanders ODESSA - a new approach to healthcare risk analysis. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:391-402 [Conf ] Ralph Holbein , Stephanie Teufel , Othmar Morger , Kurt Bauknecht A comprehensive need-to-know access control system and its application for medical information systems. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:403-414 [Conf ] R. Nelson The future of networks and network security. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:417-424 [Conf ] Maryline Laurent , Olivier Paul , Pierre Rolin Securing communications over ATM networks. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:425-439 [Conf ] Daniel Alberto Galliano , Antonio Lioy , Fabio Maino Non-intrusive authentication. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:440-451 [Conf ] P. W. J. van Zyl , Sebastiaan H. von Solms Roaming security agents enabling intelligent access control and network protection. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:452-468 [Conf ]