default search action
7. WOSIS 2009: Milan, Italy
- Alfonso Rodríguez, Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina:
Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009. INSTICC Press 2009, ISBN 978-989-8111-91-3
Full Papers
- Basel Alomair, Radha Poovendran:
Unconditionally Secure Authenticated Encryption with Shorter Keys. WOSIS 2009: 5-15 - Pino Caballero-Gil, Amparo Fúster-Sabater, Candelaria Hernández-Goya:
Deterministic Cryptanalysis of some Stream Ciphers. WOSIS 2009: 16-25 - Víctor Torres, Jaime Delgado, Xavier Maroñas, Silvia Llorente, Marc Gauvin:
Enhancing Rights Management Systems through the Development of Trusted Value Networks. WOSIS 2009: 26-35 - William R. Claycomb, Dongwan Shin:
An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information. WOSIS 2009: 36-45 - Axel Schröpfer, Florian Kerschbaum, Dagmar Sadkowiak, Richard Pibernik:
Risk-Aware Secure Supply Chain Master Planning. WOSIS 2009: 46-56 - Juan Jose Roque:
SLSB: Improving the Steganographic Algorithm LSB. WOSIS 2009: 57-66 - Luis Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernández-Medina, Mario Piattini:
MMSM-SME: Methodology for the Management of Security and its Maturity in SME. WOSIS 2009: 67-78 - Mukhtiar Memon, Michael Hafner, Ruth Breu:
Security as a Service - A Reference Architecture for SOA Security. WOSIS 2009: 79-89
Short Papers
- Jonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li:
Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation. WOSIS 2009: 93-102 - Candelaria Hernández-Goya, Pino Caballero-Gil, Amparo Fúster-Sabater:
Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks. WOSIS 2009: 103-110 - Boustia Narhimene, Aïcha Mokhtari:
DLδε-OrBAC: Context based Access Control. WOSIS 2009: 111-118 - Óscar Sánchez Ramón, Fernando Molina, Jesús García Molina, José Ambrosio Toval Álvarez:
A Model Driven Approach for Generating Code from Security Requirements. WOSIS 2009: 119-126 - Corrado Aaron Visaggio, Francesca de Rosa:
Managing Security Knowledge through Case based Reasoning. WOSIS 2009: 127-136
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.