default search action
SEC 1996: Greece
- Sokratis K. Katsikas, Dimitris Gritzalis:
Information Systems Security, Facing the information society of the 21st Century. IFIP Conference Proceedings 54, Chapman & Hall 1996, ISBN 0-412-78120-4
Part One: Secure Information Systems 1
- Jean Hitchings:
A practical solution to the complex human issues of information security design. SEC 1996: 3-12 - Ralph Holbein, Stephanie Teufel, Kurt Bauknecht:
The use of business process models for security design in organisations. SEC 1996: 13-22 - Evangelos A. Kiountouzis, Spyros Kokolakis:
An analyst's view of IS security. SEC 1996: 23-35
Part Two: Security in Mobile Communications
- Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann:
Location management strategies increasing privacy in mobile communication. SEC 1996: 39-48 - Shiuh-Jeng Wang, Le-Pond Chin, Jin-Fu Chang, Yuh-Ren Tsai:
ID-based authentication for mobile conference call. SEC 1996: 49-58
Part Three: Secure Information Systems 2
- Hilary H. Hosmer:
New security paradigms: orthodoxy and heresy. SEC 1996: 61-73 - Richard G. Wilsher, Helmut Kurth:
Security assurance in information systems. SEC 1996: 74-87 - Eric Dubois, Suchun Wu:
A framework for dealing with and specifying security requirements in information systems. SEC 1996: 88-99 - William List:
The effects of time on integrity in information systems. SEC 1996: 100-107
Part Four: Management and Legal Issues
- N. H. Pope, J. G. Ross:
EPHOS security: procurement of secure open systems. SEC 1996: 111-121 - Martin P. J. Kratz:
Canada's computer crime laws: ten years of experience. SEC 1996: 122-141 - Luc Golvers:
Delivery and installation of software: disputes and the burden of proof. SEC 1996: 142-150
Part Five: Risk and Security Assessment
- Sebastiaan H. von Solms:
Information security on the electronic superhighway. SEC 1996: 153-166 - Richard L. Baskerville:
A taxonomy for analyzing hazards to information systems. SEC 1996: 167-176 - Marc Dacier, Yves Deswarte, Mohamed Kaâniche:
Models and tools for quantitative assessment of operational security. SEC 1996: 177-186 - Les Labuschagne, Jan H. P. Eloff:
Activating dynamic counter measures to reduce risk. SEC 1996: 187-196
Part Six: Applied Cryptography
- Rolf Oppliger, Andres Albanese:
Distributed registration and key distribution (DiRK). SEC 1996: 199-208 - He Jingmin, Ed Dawson:
On the reconstruction of shared secrets. SEC 1996: 209-218 - Hannes Hassler, Vesna Hassler, Reinhard Posch:
A hierarchical threshold scheme with unique partial keys. SEC 1996: 219-226 - Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, Dimitrios Peppes:
Efficient and provably secure key agreement. SEC 1996: 227-236 - Hyun Park, Randy Chow:
Internetwork access control using public key certificates. SEC 1996: 237-246
Part Seven: Database Systems Security
- Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A Min Tjoa:
The security architecture of IRO-DB. SEC 1996: 249-258 - S. Jadodia, Kenneth P. Smith, Barbara T. Blaustein, LouAnna Notargiacomo:
Securely executing multilevel transactions. SEC 1996: 259-270 - Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:
A decentralized temporal autoritzation model. SEC 1996: 271-280
Part Eight: Authentication and Access Control
- Steven Furnell, Joseph P. Morrissey, Peter W. Sanders, Colin T. Stockel:
Applications of keystroke analysis for improved login security and continuous user authentication. SEC 1996: 283-294 - Johan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms:
MoFAC: a model for fine-grained access control. SEC 1996: 295-305 - Wilna Jansen van Rensburg, Martin S. Oliver:
A discretionary security model for object oriented environments. SEC 1996: 306-316
Part Nine: Systems and Tools for Intrusion Prevention and Detection
- Thomas Spyrou, John Darzentas:
Intention modelling: approximating computer user intentions for detection and prediction of intrusions. SEC 1996: 319-336 - Ioanna Kantzavelou, Ahmed Patel:
An attack detection system for secure computer systems - design of the ADS. SEC 1996: 337-347
Part Ten: Security in Healthcare Systems
- Louise Yngström:
IT security and privacy education. SEC 1996: 351-364 - H. James, K. Andronis, William Paul:
A human approach to security management in health care. SEC 1996: 365-376 - George Vassilacopoulos, Vassilios Chrissikopoulos, Dimitrios Peppes:
Security enforcement in a European medical device vigilance system network. SEC 1996: 377-386 - George Pangalos, Marie Khair:
Design of secure medical database systems. SEC 1996: 387-401
Part Eleven: Network and Distributed Systems Security
- Ian Uttridge, Gualtiero Bazzana, Massimo Giunchi, Gemma Deler, Stéphane Geyres, Josef Heiler:
Evaluation of the security of distributed IT systems through ITSEC/ITSEM: experiences and findings. SEC 1996: 405-416 - Theodore K. Apostolopoulos, Victoria C. Daskalou:
SNMP-based network security management using a temporal database approach. SEC 1996: 417-427 - Nikitas V. Nikitakos, Stefanos Gritzalis, Panagiotis Georgiadis:
Security profile for interconnected open distributed systems with varying vulnerability. SEC 1996: 428-437 - Sean O'Connell, A. Patel:
A model for the detection of the message stream delay attack. SEC 1996: 438-451 - Vijay Varadharajan, Thomas Hardjono:
Security model for distributed object framework and its applicability to CORBA. SEC 1996: 452-463
Part Twelve: Project Session: Invited Talk
- S. A. Frangos:
Software quality assurance: the underlying framework for achieving secure and reliable software systems. SEC 1996: 467-474
Part Thirteen: Poster Session
- Thomas Gast, Klaus Keus:
Configuration management - a basis of the high assurance software engineering process. SEC 1996: 477-479 - E. Delacour:
Multi-purpose security module based on smart cards. SEC 1996: 480-481 - Nicholas Yialelis, Morris Sloman:
An authentication service supporting domain-based access control policies. SEC 1996: 482-484 - Claudia Eckert:
On security models. SEC 1996: 485-486 - Simone Fischer-Hübner, Kathrin Schier:
Risks on the way to the global information society. SEC 1996: 487-488 - Thilo Baldin, Gerrit Bleumer:
Crypto Manager: an object oriented software library for cryptographic mechanisms. SEC 1996: 489-491 - Andrew Hutchison, Kurt Bauknecht:
Cryptographic key distribution and authentication protocols for secure group communication. SEC 1996: 492-493 - Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan:
A new hybrid encryption scheme for computer networks. SEC 1996: 494-495 - Václav Matyás Jr.:
From zero-knowledge to a practical authentication protocol. SEC 1996: 496-497
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.