


default search action
SEC 1996: Greece
- Sokratis K. Katsikas, Dimitris Gritzalis:

Information Systems Security, Facing the information society of the 21st Century. IFIP Conference Proceedings 54, Chapman & Hall 1996, ISBN 0-412-78120-4
Part One: Secure Information Systems 1
- Jean Hitchings:

A practical solution to the complex human issues of information security design. SEC 1996: 3-12 - Ralph Holbein, Stephanie Teufel, Kurt Bauknecht:

The use of business process models for security design in organisations. SEC 1996: 13-22 - Evangelos A. Kiountouzis, Spyros Kokolakis:

An analyst's view of IS security. SEC 1996: 23-35
Part Two: Security in Mobile Communications
- Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann:

Location management strategies increasing privacy in mobile communication. SEC 1996: 39-48 - Shiuh-Jeng Wang, Le-Pond Chin, Jin-Fu Chang, Yuh-Ren Tsai:

ID-based authentication for mobile conference call. SEC 1996: 49-58
Part Three: Secure Information Systems 2
- Hilary H. Hosmer:

New security paradigms: orthodoxy and heresy. SEC 1996: 61-73 - Richard G. Wilsher, Helmut Kurth:

Security assurance in information systems. SEC 1996: 74-87 - Eric Dubois, Suchun Wu:

A framework for dealing with and specifying security requirements in information systems. SEC 1996: 88-99 - William List:

The effects of time on integrity in information systems. SEC 1996: 100-107
Part Four: Management and Legal Issues
- N. H. Pope, J. G. Ross:

EPHOS security: procurement of secure open systems. SEC 1996: 111-121 - Martin P. J. Kratz:

Canada's computer crime laws: ten years of experience. SEC 1996: 122-141 - Luc Golvers:

Delivery and installation of software: disputes and the burden of proof. SEC 1996: 142-150
Part Five: Risk and Security Assessment
- Sebastiaan H. von Solms:

Information security on the electronic superhighway. SEC 1996: 153-166 - Richard L. Baskerville:

A taxonomy for analyzing hazards to information systems. SEC 1996: 167-176 - Marc Dacier, Yves Deswarte, Mohamed Kaâniche:

Models and tools for quantitative assessment of operational security. SEC 1996: 177-186 - Les Labuschagne, Jan H. P. Eloff:

Activating dynamic counter measures to reduce risk. SEC 1996: 187-196
Part Six: Applied Cryptography
- Rolf Oppliger, Andres Albanese:

Distributed registration and key distribution (DiRK). SEC 1996: 199-208 - He Jingmin, Ed Dawson:

On the reconstruction of shared secrets. SEC 1996: 209-218 - Hannes Hassler, Vesna Hassler, Reinhard Posch:

A hierarchical threshold scheme with unique partial keys. SEC 1996: 219-226 - Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, Dimitrios Peppes:

Efficient and provably secure key agreement. SEC 1996: 227-236 - Hyun Park, Randy Chow:

Internetwork access control using public key certificates. SEC 1996: 237-246
Part Seven: Database Systems Security
- Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A Min Tjoa:

The security architecture of IRO-DB. SEC 1996: 249-258 - S. Jadodia, Kenneth P. Smith, Barbara T. Blaustein, LouAnna Notargiacomo:

Securely executing multilevel transactions. SEC 1996: 259-270 - Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:

A decentralized temporal autoritzation model. SEC 1996: 271-280
Part Eight: Authentication and Access Control
- Steven Furnell, Joseph P. Morrissey, Peter W. Sanders, Colin T. Stockel:

Applications of keystroke analysis for improved login security and continuous user authentication. SEC 1996: 283-294 - Johan S. von Solms, Martin S. Olivier, Sebastiaan H. von Solms:

MoFAC: a model for fine-grained access control. SEC 1996: 295-305 - Wilna Jansen van Rensburg, Martin S. Oliver:

A discretionary security model for object oriented environments. SEC 1996: 306-316
Part Nine: Systems and Tools for Intrusion Prevention and Detection
- Thomas Spyrou, John Darzentas:

Intention modelling: approximating computer user intentions for detection and prediction of intrusions. SEC 1996: 319-336 - Ioanna Kantzavelou, Ahmed Patel:

An attack detection system for secure computer systems - design of the ADS. SEC 1996: 337-347
Part Ten: Security in Healthcare Systems
- Louise Yngström:

IT security and privacy education. SEC 1996: 351-364 - H. James, K. Andronis, William Paul:

A human approach to security management in health care. SEC 1996: 365-376 - George Vassilacopoulos, Vassilios Chrissikopoulos, Dimitrios Peppes:

Security enforcement in a European medical device vigilance system network. SEC 1996: 377-386 - George Pangalos, Marie Khair:

Design of secure medical database systems. SEC 1996: 387-401
Part Eleven: Network and Distributed Systems Security
- Ian Uttridge, Gualtiero Bazzana, Massimo Giunchi, Gemma Deler, Stéphane Geyres, Josef Heiler:

Evaluation of the security of distributed IT systems through ITSEC/ITSEM: experiences and findings. SEC 1996: 405-416 - Theodore K. Apostolopoulos, Victoria C. Daskalou:

SNMP-based network security management using a temporal database approach. SEC 1996: 417-427 - Nikitas V. Nikitakos, Stefanos Gritzalis, Panagiotis Georgiadis:

Security profile for interconnected open distributed systems with varying vulnerability. SEC 1996: 428-437 - Sean O'Connell, A. Patel:

A model for the detection of the message stream delay attack. SEC 1996: 438-451 - Vijay Varadharajan, Thomas Hardjono:

Security model for distributed object framework and its applicability to CORBA. SEC 1996: 452-463
Part Twelve: Project Session: Invited Talk
- S. A. Frangos:

Software quality assurance: the underlying framework for achieving secure and reliable software systems. SEC 1996: 467-474
Part Thirteen: Poster Session
- Thomas Gast, Klaus Keus:

Configuration management - a basis of the high assurance software engineering process. SEC 1996: 477-479 - E. Delacour:

Multi-purpose security module based on smart cards. SEC 1996: 480-481 - Nicholas Yialelis, Morris Sloman:

An authentication service supporting domain-based access control policies. SEC 1996: 482-484 - Claudia Eckert:

On security models. SEC 1996: 485-486 - Simone Fischer-Hübner, Kathrin Schier:

Risks on the way to the global information society. SEC 1996: 487-488 - Thilo Baldin, Gerrit Bleumer:

Crypto Manager: an object oriented software library for cryptographic mechanisms. SEC 1996: 489-491 - Andrew Hutchison, Kurt Bauknecht:

Cryptographic key distribution and authentication protocols for secure group communication. SEC 1996: 492-493 - Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan:

A new hybrid encryption scheme for computer networks. SEC 1996: 494-495 - Václav Matyás Jr.:

From zero-knowledge to a practical authentication protocol. SEC 1996: 496-497

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














