default search action
SEC 2002: Cairo, Egypt
- Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba Kamal Aslan:
Security in the Information Society: Visions and Perspectives, IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt. IFIP Conference Proceedings 214, Kluwer 2002, ISBN 1-4020-7030-6
Information Security Management
- Oliver André Hoppe, Johan Van Niekerk, Rossouw von Solms:
The Effective Implementation of Information Security in Organizations. SEC 2002: 1-18 - Cheryl Vroom, Rossouw von Solms:
A Practical Approach to Information Security Awareness in the Organization. SEC 2002: 19-38 - David W. Chadwick, Alexander Otenko:
RBAC Policies in XML for X.509 Based Privilege Management. SEC 2002: 39-54 - Aftab Ahmad, Tobias Ruighaver:
A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration. SEC 2002: 55-66 - Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos:
Elaborating Quantitative Approaches for IT Security Evaluation. SEC 2002: 67-78
Standards of Information Security
- W. J. Brooks, Matthew J. Warren, William Hutchinson:
A Security Evaluation Criteria for Baseline Security Standards. SEC 2002: 79-90 - Mikko T. Siponen:
Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects. SEC 2002: 91-108
Threats and Attacks to Information
- A. Alayed, Steven Furnell, I. M. Barlow:
Addressing Internet Security Vulnerabilities: A Benchmarking Study. SEC 2002: 121-132 - John Haggerty, Qi Shi, Madjid Merabti:
The Threat From Within -An Analysis of Attacks on anInternal Network. SEC 2002: 133-146 - Simeon Xenitellis:
Security Vulnerabilities in Event-Driven Systems. SEC 2002: 147-160 - J. J. Yan:
Denial of Service: Another Example. SEC 2002: 161-170 - D. Salah, Heba Kamal Aslan, Mahmoud T. El-Hadidi:
A Detection Scheme for the SK Virus. SEC 2002: 171-182
Education and Curriculum for Information Security
- Teemupekka Virtanen, Ronja Addams-Moring:
An Information Security Curriculum in Finland. SEC 2002: 183-190
Social and Ethical Aspects of Information Security
- Thomas Schlienger, Stephanie Teufel:
Information Security Culture: The Socio-Cultural Dimension in Information Security Management. SEC 2002: 191-202 - A. Martins, Jan H. P. Eloff:
Information Security Culture. SEC 2002: 203-214
Information Security Services
- Paul Dowland, Steven Furnell, Maria Papadaki:
Keystroke Analysis as a Method of Advanced User Authentication and Response. SEC 2002: 215-226 - Magdy S. El-Soudani, H. S. El-Refaey, H. M. Mourad:
Zero Knowledge Broadcasting Identification Scheme. SEC 2002: 227-238 - Li-Sha He, Ning Zhang, Li-Rong He:
A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services. SEC 2002: 239-250 - Carla Merkle Westphall, Joni da Silva Fraga, Carlos Becker Westphall, S. C. S. Bianchi:
Mandatory Security Policies for CORBA Security Model. SEC 2002: 251-262 - Carla Merkle Westphall, Joni da Silva Fraga, Michelle S. Wangham, Rafael R. Obelheiro, Lau Cheuk Lung:
Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security. SEC 2002: 263-274 - Marijke Coetzee, Jan H. P. Eloff:
Secure Database Connectivity on the WWW. SEC 2002: 275-286 - Reinhardt A. Botha:
Towards Semantic Integrity in Rational Databases. SEC 2002: 287-298 - G. Osman, M. G. Darwish, Mohammed Zaki:
Formal Design of Packet Filtering Systems. SEC 2002: 299-310 - Elsayed Mohammed, A. Emarah, Kh. El-Shennawy:
Elliptic Curve Cryptosystems on Smart Cards. SEC 2002: 311-322
Multilateral Security
Applications of Information Security
- Christer Magnusson, Louise Yngström:
BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business. SEC 2002: 335-346 - Theodore Tryfonas, Evangelos A. Kiountouzis:
Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration. SEC 2002: 347-356 - Riham Abdel-Moneim, Sherif El-Kassas, Hoda Hosny:
An Efficient Hybrid Sealed Bid Auction Protocol. SEC 2002: 357-372 - Simone Fischer-Hübner, Mikael Nilsson, Helena Lindskog:
Self-Determination in Mobile Internet: PiMI Prototype Results. SEC 2002: 373-386 - Simon N. Foley, Thomas B. Quillinan, John P. Morrison:
Secure Component Distribution Using WebCom. SEC 2002: 387-398 - Ryuya Uda, Masahito Ito, Kohei Awaya, Hiroshi Shigeno, Yutaka Matsushita:
E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals. SEC 2002: 399-410 - Delia Critchlow, Ning Zhang:
An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions. SEC 2002: 411-422
Infrastructure for Information Security
- Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia:
Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434
Advanced Topics in Security
- S. T. Faraj, F. Al-Naima, S. Y. Ameen:
Optical Network Models for Quantum Cryptography. SEC 2002: 435-452
Legislation for Information Security
- Panagiotes S. Anastasiades:
A Unified Regulatory Framework on a European Information Society: Suggested Building Levels. SEC 2002: 453-468 - Lilian Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas:
Revisiting Legal and Regulatory Requirements for Secure E-Voting. SEC 2002: 469-480
Modeling and Analysis for Information Security
- Meletis A. Belsis, Anthony N. Godwin, Leonid Smalov:
A Security Incident Data Model. SEC 2002: 481-494 - Arion Meier, Susanne Röhrig:
Security Levels for Contracting Agents. SEC 2002: 495-506 - Spyros Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou:
Functional Requirements for a Secure Electronic Voting System. SEC 2002: 507-520 - M. Hashem, A. Mohamed, M. Wahib:
Intelligent IP Packet Filtering. SEC 2002: 521-535
Tools for Information Security
- Mariki M. Eloff, Jan H. P. Eloff:
Human Computer Interaction: An Information Security Perspectives. SEC 2002: 535-546 - Jean-François Geneste:
A Very Smart Card for Fighting Against Terrorism. SEC 2002: 547-558 - Michael Meier, Niels Bischof, Thomas Holz:
SHEDEL-A Simple Hierarchical Event Description Language for Specifying Attack Signatures. SEC 2002: 559-572 - Kenneth P. Smith, Donald B. Faatz, Amgad Fayad, Sushil Jajodia:
Propagating Modifications to Mobile Policies. SEC 2002: 573-584
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.