


default search action
Information Security Technical Report, Volume 9
Volume 9, Number 1, January - March 2004
- Scarlet Schwiderski-Grosche:

Introduction. 5 - Mike Small:

Business and technical motivation for identity management. 6-21 - Geoff Brown:

The use of hardware tokens for identity management. 22-25 - Rolf Oppliger:

Microsoft .NET Passport and identity management. 26-34 - Marit Hansen, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, Michael Waidner

:
Privacy-enhancing identity management. 35-44 - Birgit Pfitzmann:

Privacy in enterprise identity federation - policies for Liberty 2 single sign on. 45-58 - Yuri Demchenko

:
Virtual organisations in computer grids and identity management. 59-76 - Kai Rannenberg:

Identity management in mobile cellular networks and related applications. 77-85 - Gavenraj Sodhi:

User provisioning with SPML. 86-96
Volume 9, Number 2, April - June 2004
- Michael J. Ganley:

Introduction. 5 - Andrey Nikishin:

Malicious software - past, present and future. 6-18 - Richard Ford:

The future of virus detection. 19-26 - David Williamson:

Deconstructing malware: what it is and how to stop it. 27-34 - Joe Stewart:

This business of malware. 35-41 - Sami Rautiainen:

Sound of silence. 42-46 - Jay G. Heiser:

Understanding today's malware. 47-64 - Shaun Fothergill:

Business issues relating to malware. 65-75
Volume 9, Number 3, July - September 2004
- Jason Crampton:

Introduction. 5 - Berin Lautenbach:

Introduction to XML Encryption and XML Signature. 6-18 - Elisa Bertino, Barbara Carminati

, Elena Ferrari
:
Access control for XML documents and data. 19-34 - Claudio A. Ardagna

, Ernesto Damiani
, Sabrina De Capitani di Vimercati, Pierangela Samarati
:
XML-based access control languages. 35-46 - Renato Iannella:

The Open Digital Rights Language: XML for Digital Rights Management. 47-55 - Paul Madsen:

Federated identity and web services. 56-65 - Peter Michalek:

Dissecting application security XML schemas: AVDL, WAS, OVAL - state of the XML security standards report. 66-76
Volume 9, Number 4, December 2004
- Scarlet Schwiderski-Grosche:

Introduction. 5 - Thomas Walter, Laurent Bussard, Yves Roudier, Jochen Haller, Roger Kilian-Kehr, Joachim Posegga, Philip Robinson:

Secure mobile business applications - framework, architecture and implementation. 6-21 - James Irwin:

Digital Rights Management: The Open Mobile Alliance DRM specifications. 22-31 - Valtteri Niemi:

Trends in mobile security standards. 32-38 - Heiko Knospe

, Hartmut Pohl:
RFID security. 39-50 - Derek Babb:

User requirements for security in wireless mobile systems. 51-59 - Terence E. Dodgson:

Mobile terminal security and tracking. 60-80

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














