The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security (sec)
1997 (conf/sec/1997)

  1. Alan K. Stanley
    Information security - challenges for the next millennium. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:3-8 [Conf]
  2. C. P. Louwrens, Sebastiaan H. von Solms
    Selection of secure single sign-on solutions for heterogeneous computing environments. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:9-24 [Conf]
  3. Jussipekka Leiwo, Yuliang Zheng
    A formal model to aid documenting and harmonizing of information security requirements. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:25-38 [Conf]
  4. Masha Gendler-Fishman, Ehud Gudes
    A compile-time model for safe information flow in object-oriented databases. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:41-55 [Conf]
  5. Silvana Castano, Maria Grazia Fugini
    Deriving Authorizations from Process Analysis in Legacy Information Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:56-67 [Conf]
  6. Mads Bryde Andersen
    The role of government in creating the IT security infrastructure: builder or bystander? [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:71-77 [Conf]
  7. Lam-for Kwok, Dennis Longley
    Code of Practice: A Standard for Information Security Management. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:78-90 [Conf]
  8. Rossouw von Solms
    Can security baselines replace risk analysis? [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:91-98 [Conf]
  9. Andrew Hutchison
    gGSS-API: a group enhanced generic security service. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:101-110 [Conf]
  10. Per Furberg
    Electronic document exchange in Sweden - the legal aspects. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:113-119 [Conf]
  11. Ioanna Kantzavelou, Sokratis K. Katsikas
    An attack detection system for secure computer systems - outline of the solution. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:123-135 [Conf]
  12. Erland Jonsson, Lech J. Janczewski
    A taxonomy and overview of information security experiments. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:139-150 [Conf]
  13. Michael Sobirey, Simone Fischer-Hübner, Kai Rannenberg
    Pseudonymous audit for privacy enhanced intrusion detection. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:151-163 [Conf]
  14. Martin Reichenbach, Herbert Damker, Hannes Federrath, Kai Rannenberg
    Individual management of personal reachability in mobile communication. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:164-174 [Conf]
  15. Willis H. Ware
    New vistas on info-system security. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:177-196 [Conf]
  16. R. Kruger, Jan H. P. Eloff
    A common criteria framework for the evaluation of information technology systems security. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:197-209 [Conf]
  17. Jan H. P. Eloff, R. Körner
    A methodology for accrediting a commercial distributed database. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:210-221 [Conf]
  18. A. van Rensburg, Sebastiaan H. von Solms
    A comparison of schemes for certification authorities/trusted third parties. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:222-240 [Conf]
  19. Audun Jøsang, F. Van Laenen, Svein J. Knapskog, Joos Vandewalle
    How to trust systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:241-252 [Conf]
  20. O. Tettero, D. J. Out, Henry M. Franken, J. Schot
    Integrating information security in the development of telematics systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:255-266 [Conf]
  21. Claudia Eckert, D. Marek
    Developing secure applications: a systematic approach. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:267-279 [Conf]
  22. W. Olivier, Helen van de Haar
    Controlling Internet access at an educational institution. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:280-292 [Conf]
  23. Klaus Brunnstein
    Analysis of Java security and hostile applets. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:293-295 [Conf]
  24. Richard Baskerville
    New organizational forms for information security management. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:296-307 [Conf]
  25. Edo Roos Lindgreen, H. R. D. Janus, A. Shahim, G. Hulst, I. S. Herschberg
    Security when outsourcing: concepts, constructs, compliance. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:308-318 [Conf]

  26. The IFIP TC11 position on cryptopolicies. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:321-322 [Conf]
  27. Klaus Brunnstein
    Towards a holistic view of security and safety of enterprise information and communication technologies: adapting to a changing paradigm. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:325-336 [Conf]
  28. Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson
    A taxonomy of electronic cash schemes. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:337-348 [Conf]
  29. Andreu Riera, Joan Borrell, Josep Rifà
    Large scale elections by coordinating electoral colleges. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:349-362 [Conf]
  30. Claudia Eckert, Th. Stoesslein
    MVS-SAT: a security administration tool to support SMF protocol data evaluation. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:363-374 [Conf]
  31. Bernd Blobel
    Security requirements and solutions in distributed electronic health records. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:377-390 [Conf]
  32. Matthew J. Warren, Steven Furnell, Peter W. Sanders
    ODESSA - a new approach to healthcare risk analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:391-402 [Conf]
  33. Ralph Holbein, Stephanie Teufel, Othmar Morger, Kurt Bauknecht
    A comprehensive need-to-know access control system and its application for medical information systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:403-414 [Conf]
  34. R. Nelson
    The future of networks and network security. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:417-424 [Conf]
  35. Maryline Laurent, Olivier Paul, Pierre Rolin
    Securing communications over ATM networks. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:425-439 [Conf]
  36. Daniel Alberto Galliano, Antonio Lioy, Fabio Maino
    Non-intrusive authentication. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:440-451 [Conf]
  37. P. W. J. van Zyl, Sebastiaan H. von Solms
    Roaming security agents enabling intelligent access control and network protection. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:452-468 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002