


default search action
Information Security Technical Report, Volume 13
Volume 13, Number 1, 2008
- Dieter Gollmann:

Securing Web applications. 1-9 - Francesca Saglietti, Norbert Oster

, Florin Pinte:
White and grey-box verification and validation approaches for safety- and security-critical software systems. 10-16 - John P. McDermott, James Kirby, Bruce E. Montrose, Travis Johnson, Myong H. Kang:

Re-engineering Xen internals for higher-assurance security. 17-24 - Lieven Desmet

, Wouter Joosen, Fabio Massacci
, Pieter Philippaerts
, Frank Piessens, Ida Sri Rejeki Siahaan
, Dries Vanoverberghe:
Security-by-contract on the .NET platform. 25-32 - Brian Chess, Jacob West:

Dynamic taint propagation: Finding vulnerabilities without attacking. 33-39 - Mason Brown, Alan Paller:

Secure software development: Why the development world awoke to the challenge. 40-43
Volume 13, Number 2, May 2008
- Michael J. Ganley:

Introduction to this issue. 45 - Siddhartha Arora:

National e-ID card schemes: A European overview. 46-53 - Danny De Cock, Koen Simoens

, Bart Preneel:
Insights on identity documents based on the Belgian case study. 54-60 - Tony Collings:

Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID). 61-70 - Paul de Hert:

Identity management of e-ID, privacy and security in Europe. A human rights view. 71-75 - Thomas Myhr:

Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution: or I am 621216-1318, but I am also 161262-43774. Do you know who I am? 76-82 - Marit Hansen, Andreas Pfitzmann, Sandra Steinbrecher:

Identity management throughout one's whole life. 83-94 - Geraint Price:

The benefits and drawbacks of using electronic identities. 95-103
- John Steer, Ashish Popli:

Building secure business applications at Microsoft. 105-110
Volume 13, Number 3, August 2008
- Allan Tomlinson:

Developments in mobile communications security. 111 - André van Cleeff:

Future consumer mobile phone security: A case study using the data-centric security model. 112-117 - Adrian Leung:

A mobile device management framework for secure service delivery. 118-126 - John A. MacDonald:

Authentication & key agreement for off-portal mobile applications. 127-135 - Rene Mayrhofer

, Hans Gellersen
:
Spontaneous mobile device authentication based on sensor data. 136-150 - Nai-Wei Lo, Kuo-Hui Yeh, Chan Yeob Yeun

:
New mutual agreement protocol to secure mobile RFID-enabled devices. 151-157 - Chan Yeob Yeun

, Kyusuk Han
, Duc-Liem Vo, Kwangjo Kim:
Secure authenticated group key agreement protocol in the MANET environment. 158-164 - Christoph Krauß

, Markus Schneider, Claudia Eckert:
On handling insider attacks in wireless sensor networks. 165-172 - Keith Mayes, Konstantinos Markantonakis

:
Mobile communication security controllers an evaluation paper. 173-192
Volume 13, Number 4, November 2008
- Lizzie Coles-Kemp:

Introduction. 193-194 - Debi Ashenden

:
Information Security management: A human challenge? 195-201 - Iain Crinson:

Assessing the 'insider-outsider threat' duality in the context of the development of public-private partnerships delivering 'choice' in healthcare services: A sociomaterial critique. 202-206 - Patricia A. H. Williams

:
In a 'trusting' environment, everyone is responsible for information security. 207-215 - Richard E. Overill:

ISMS insider intrusion prevention and detection. 216-219 - Andy Jones:

Catching the malicious insider. 220-224 - Terrence Walker:

Practical management of malicious insider threat - An enterprise CSIRT perspective. 225-234 - Christian W. Probst

, René Rydhof Hansen
:
An extensible analysable system model. 235-246 - Edward Humphreys:

Information security management standards: Compliance, governance and risk management. 247-255

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














