callback( { "result":{ "query":":facetid:toc:\"db/conf/sec/sec2002.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"62.54" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"46", "@dc":"46", "@oc":"46", "@id":"43423412", "text":":facetid:toc:db/conf/sec/sec2002.bht" } }, "hits":{ "@total":"46", "@computed":"46", "@sent":"46", "@first":"0", "hit":[{ "@score":"1", "@id":"6304652", "info":{"authors":{"author":[{"@pid":"19/5697","text":"Riham Abdel-Moneim"},{"@pid":"70/1253","text":"Sherif El-Kassas"},{"@pid":"19/6290","text":"Hoda Hosny"}]},"title":"An Efficient Hybrid Sealed Bid Auction Protocol.","venue":"SEC","pages":"357-372","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/Abdel-MoneimEH02","url":"https://dblp.org/rec/conf/sec/Abdel-MoneimEH02"}, "url":"URL#6304652" }, { "@score":"1", "@id":"6304653", "info":{"authors":{"author":[{"@pid":"92/3202","text":"Aftab Ahmad"},{"@pid":"76/737","text":"Tobias Ruighaver"}]},"title":"A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration.","venue":"SEC","pages":"55-66","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/AhmadR02","url":"https://dblp.org/rec/conf/sec/AhmadR02"}, "url":"URL#6304653" }, { "@score":"1", "@id":"6304654", "info":{"authors":{"author":[{"@pid":"11/2729","text":"A. Alayed"},{"@pid":"83/2392","text":"Steven Furnell"},{"@pid":"80/387","text":"I. M. Barlow"}]},"title":"Addressing Internet Security Vulnerabilities: A Benchmarking Study.","venue":"SEC","pages":"121-132","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/AlayedFB02","url":"https://dblp.org/rec/conf/sec/AlayedFB02"}, "url":"URL#6304654" }, { "@score":"1", "@id":"6304655", "info":{"authors":{"author":{"@pid":"21/4154","text":"Panagiotes S. Anastasiades"}},"title":"A Unified Regulatory Framework on a European Information Society: Suggested Building Levels.","venue":"SEC","pages":"453-468","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/Anastasiades02","url":"https://dblp.org/rec/conf/sec/Anastasiades02"}, "url":"URL#6304655" }, { "@score":"1", "@id":"6304656", "info":{"authors":{"author":[{"@pid":"08/1034","text":"Meletis A. Belsis"},{"@pid":"30/6670","text":"Anthony N. Godwin"},{"@pid":"62/5939","text":"Leonid Smalov"}]},"title":"A Security Incident Data Model.","venue":"SEC","pages":"481-494","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/BelsisGS02","url":"https://dblp.org/rec/conf/sec/BelsisGS02"}, "url":"URL#6304656" }, { "@score":"1", "@id":"6304657", "info":{"authors":{"author":{"@pid":"37/4366","text":"Reinhardt A. Botha"}},"title":"Towards Semantic Integrity in Rational Databases.","venue":"SEC","pages":"287-298","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/Botha02","url":"https://dblp.org/rec/conf/sec/Botha02"}, "url":"URL#6304657" }, { "@score":"1", "@id":"6304658", "info":{"authors":{"author":[{"@pid":"19/2038","text":"W. J. Brooks"},{"@pid":"10/2372","text":"Matthew J. Warren"},{"@pid":"81/3344","text":"William Hutchinson"}]},"title":"A Security Evaluation Criteria for Baseline Security Standards.","venue":"SEC","pages":"79-90","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/BrooksWH02","url":"https://dblp.org/rec/conf/sec/BrooksWH02"}, "url":"URL#6304658" }, { "@score":"1", "@id":"6304659", "info":{"authors":{"author":[{"@pid":"c/DavidWChadwick","text":"David W. Chadwick"},{"@pid":"o/SassaOtenko","text":"Alexander Otenko"}]},"title":"RBAC Policies in XML for X.509 Based Privilege Management.","venue":"SEC","pages":"39-54","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/ChadwickO02","url":"https://dblp.org/rec/conf/sec/ChadwickO02"}, "url":"URL#6304659" }, { "@score":"1", "@id":"6304660", "info":{"authors":{"author":[{"@pid":"87/5810","text":"Marijke Coetzee"},{"@pid":"09/676","text":"Jan H. P. Eloff"}]},"title":"Secure Database Connectivity on the WWW.","venue":"SEC","pages":"275-286","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/CoetzeeE02","url":"https://dblp.org/rec/conf/sec/CoetzeeE02"}, "url":"URL#6304660" }, { "@score":"1", "@id":"6304661", "info":{"authors":{"author":[{"@pid":"13/6206","text":"Delia Critchlow"},{"@pid":"z/NingZhang","text":"Ning Zhang 0001"}]},"title":"An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions.","venue":"SEC","pages":"411-422","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/CritchlowZ02","url":"https://dblp.org/rec/conf/sec/CritchlowZ02"}, "url":"URL#6304661" }, { "@score":"1", "@id":"6304662", "info":{"authors":{"author":{"@pid":"32/2041","text":"T. Demuth"}},"title":"Establishing Bilateral Anonymous Communication in Open Networks.","venue":"SEC","pages":"323-334","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/Demuth02","url":"https://dblp.org/rec/conf/sec/Demuth02"}, "url":"URL#6304662" }, { "@score":"1", "@id":"6304663", "info":{"authors":{"author":[{"@pid":"24/409","text":"Paul Dowland 0001"},{"@pid":"83/2392","text":"Steven Furnell"},{"@pid":"69/1571","text":"Maria Papadaki"}]},"title":"Keystroke Analysis as a Method of Advanced User Authentication and Response.","venue":"SEC","pages":"215-226","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/DowlandFP02","url":"https://dblp.org/rec/conf/sec/DowlandFP02"}, "url":"URL#6304663" }, { "@score":"1", "@id":"6304664", "info":{"authors":{"author":[{"@pid":"s/MMSElSoudani","text":"Magdy S. El-Soudani"},{"@pid":"05/366","text":"H. S. El-Refaey"},{"@pid":"57/3512","text":"H. M. Mourad"}]},"title":"Zero Knowledge Broadcasting Identification Scheme.","venue":"SEC","pages":"227-238","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/El-SoudaniEM02","url":"https://dblp.org/rec/conf/sec/El-SoudaniEM02"}, "url":"URL#6304664" }, { "@score":"1", "@id":"6304665", "info":{"authors":{"author":[{"@pid":"95/6309","text":"Mariki M. Eloff"},{"@pid":"09/676","text":"Jan H. P. Eloff"}]},"title":"Human Computer Interaction: An Information Security Perspectives.","venue":"SEC","pages":"535-546","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/EloffE02","url":"https://dblp.org/rec/conf/sec/EloffE02"}, "url":"URL#6304665" }, { "@score":"1", "@id":"6304666", "info":{"authors":{"author":[{"@pid":"38/2176","text":"S. T. Faraj"},{"@pid":"44/4274","text":"F. Al-Naima"},{"@pid":"95/3076","text":"S. Y. Ameen"}]},"title":"Optical Network Models for Quantum Cryptography.","venue":"SEC","pages":"435-452","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/FarajAA02","url":"https://dblp.org/rec/conf/sec/FarajAA02"}, "url":"URL#6304666" }, { "@score":"1", "@id":"6304667", "info":{"authors":{"author":[{"@pid":"f/SimoneFischerHubner","text":"Simone Fischer-Hübner"},{"@pid":"59/6277","text":"Mikael Nilsson"},{"@pid":"78/3345","text":"Helena Lindskog"}]},"title":"Self-Determination in Mobile Internet: PiMI Prototype Results.","venue":"SEC","pages":"373-386","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/Fischer-HubnerNL02","url":"https://dblp.org/rec/conf/sec/Fischer-HubnerNL02"}, "url":"URL#6304667" }, { "@score":"1", "@id":"6304668", "info":{"authors":{"author":[{"@pid":"f/SNFoley","text":"Simon N. Foley"},{"@pid":"05/5007","text":"Thomas B. Quillinan"},{"@pid":"56/3725","text":"John P. Morrison"}]},"title":"Secure Component Distribution Using WebCom.","venue":"SEC","pages":"387-398","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/FoleyQM02","url":"https://dblp.org/rec/conf/sec/FoleyQM02"}, "url":"URL#6304668" }, { "@score":"1", "@id":"6304669", "info":{"authors":{"author":{"@pid":"93/5892","text":"Jean-François Geneste"}},"title":"A Very Smart Card for Fighting Against Terrorism.","venue":"SEC","pages":"547-558","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/Geneste02","url":"https://dblp.org/rec/conf/sec/Geneste02"}, "url":"URL#6304669" }, { "@score":"1", "@id":"6304670", "info":{"authors":{"author":[{"@pid":"48/4664","text":"Dimitris Gritzalis"},{"@pid":"43/6253-1","text":"Maria Karyda 0001"},{"@pid":"75/6304","text":"Lazaros Gymnopoulos"}]},"title":"Elaborating Quantitative Approaches for IT Security Evaluation.","venue":"SEC","pages":"67-78","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/GritzalisKG02","url":"https://dblp.org/rec/conf/sec/GritzalisKG02"}, "url":"URL#6304670" }, { "@score":"1", "@id":"6304671", "info":{"authors":{"author":[{"@pid":"44/4351","text":"John Haggerty"},{"@pid":"05/4613-1","text":"Qi Shi 0001"},{"@pid":"29/3848","text":"Madjid Merabti"}]},"title":"The Threat From Within -An Analysis of Attacks on anInternal Network.","venue":"SEC","pages":"133-146","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/HaggertySM02","url":"https://dblp.org/rec/conf/sec/HaggertySM02"}, "url":"URL#6304671" }, { "@score":"1", "@id":"6304672", "info":{"authors":{"author":[{"@pid":"33/3062","text":"M. Hashem"},{"@pid":"25/5069","text":"A. Mohamed"},{"@pid":"16/1819","text":"M. Wahib"}]},"title":"Intelligent IP Packet Filtering.","venue":"SEC","pages":"521-535","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/HashemMW02","url":"https://dblp.org/rec/conf/sec/HashemMW02"}, "url":"URL#6304672" }, { "@score":"1", "@id":"6304673", "info":{"authors":{"author":[{"@pid":"51/5664","text":"Li-Sha He"},{"@pid":"z/NingZhang","text":"Ning Zhang 0001"},{"@pid":"30/3435","text":"Li-Rong He"}]},"title":"A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services.","venue":"SEC","pages":"239-250","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/HeZH02","url":"https://dblp.org/rec/conf/sec/HeZH02"}, "url":"URL#6304673" }, { "@score":"1", "@id":"6304674", "info":{"authors":{"author":[{"@pid":"46/6422","text":"O. A. Hoppe"},{"@pid":"30/2024","text":"Johan Van Niekerk"},{"@pid":"89/3539","text":"Rossouw von Solms"}]},"title":"The Effective Implementation of Information Security in Organizations.","venue":"SEC","pages":"1-18","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/HoppeNS02","url":"https://dblp.org/rec/conf/sec/HoppeNS02"}, "url":"URL#6304674" }, { "@score":"1", "@id":"6304675", "info":{"authors":{"author":[{"@pid":"82/5510","text":"Spyros Ikonomopoulos"},{"@pid":"16/6779","text":"Costas Lambrinoudakis"},{"@pid":"48/4664","text":"Dimitris Gritzalis"},{"@pid":"29/4917","text":"Spyros Kokolakis"},{"@pid":"35/3109","text":"K. Vassiliou"}]},"title":"Functional Requirements for a Secure Electronic Voting System.","venue":"SEC","pages":"507-520","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/IkonomopoulosLGKV02","url":"https://dblp.org/rec/conf/sec/IkonomopoulosLGKV02"}, "url":"URL#6304675" }, { "@score":"1", "@id":"6304676", "info":{"authors":{"author":{"@pid":"04/1082","text":"Maryline Laurent-Maknavicius"}},"title":"For a Secure Mobile IP and Mobile IPv6 Deployment.","venue":"SEC","pages":"109-120","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/Laurent-Maknavicius02","url":"https://dblp.org/rec/conf/sec/Laurent-Maknavicius02"}, "url":"URL#6304676" }, { "@score":"1", "@id":"6304677", "info":{"authors":{"author":[{"@pid":"92/1538","text":"Christer Magnusson"},{"@pid":"53/3219","text":"Louise Yngström"}]},"title":"BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business.","venue":"SEC","pages":"335-346","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/MagnussonY02","url":"https://dblp.org/rec/conf/sec/MagnussonY02"}, "url":"URL#6304677" }, { "@score":"1", "@id":"6304678", "info":{"authors":{"author":[{"@pid":"43/3830","text":"A. Martins"},{"@pid":"09/676","text":"Jan H. P. Eloff"}]},"title":"Information Security Culture.","venue":"SEC","pages":"203-214","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/MartinsE02","url":"https://dblp.org/rec/conf/sec/MartinsE02"}, "url":"URL#6304678" }, { "@score":"1", "@id":"6304679", "info":{"authors":{"author":[{"@pid":"m/MichaelMeier1","text":"Michael Meier 0001"},{"@pid":"54/5664","text":"Niels Bischof"},{"@pid":"25/4487-2","text":"Thomas Holz 0002"}]},"title":"SHEDEL-A Simple Hierarchical Event Description Language for Specifying Attack Signatures.","venue":"SEC","pages":"559-572","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/MeierBH02","url":"https://dblp.org/rec/conf/sec/MeierBH02"}, "url":"URL#6304679" }, { "@score":"1", "@id":"6304680", "info":{"authors":{"author":[{"@pid":"35/11168","text":"Arion Meier"},{"@pid":"44/1443","text":"Susanne Röhrig"}]},"title":"Security Levels for Contracting Agents.","venue":"SEC","pages":"495-506","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/MeierR02","url":"https://dblp.org/rec/conf/sec/MeierR02"}, "url":"URL#6304680" }, { "@score":"1", "@id":"6304681", "info":{"authors":{"author":[{"@pid":"82/6972","text":"Lilian Mitrou"},{"@pid":"48/4664","text":"Dimitris Gritzalis"},{"@pid":"36/6241","text":"Sokratis K. Katsikas"}]},"title":"Revisiting Legal and Regulatory Requirements for Secure E-Voting.","venue":"SEC","pages":"469-480","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/MitrouGK02","url":"https://dblp.org/rec/conf/sec/MitrouGK02"}, "url":"URL#6304681" }, { "@score":"1", "@id":"6304682", "info":{"authors":{"author":[{"@pid":"27/448","text":"Elsayed Mohammed"},{"@pid":"04/541","text":"A. Emarah"},{"@pid":"21/6971","text":"Kh. El-Shennawy"}]},"title":"Elliptic Curve Cryptosystems on Smart Cards.","venue":"SEC","pages":"311-322","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/MohammedEE02","url":"https://dblp.org/rec/conf/sec/MohammedEE02"}, "url":"URL#6304682" }, { "@score":"1", "@id":"6304683", "info":{"authors":{"author":[{"@pid":"62/5619","text":"G. Osman"},{"@pid":"80/3988","text":"M. G. Darwish"},{"@pid":"z/MohammedZaki","text":"Mohammed Zaki 0001"}]},"title":"Formal Design of Packet Filtering Systems.","venue":"SEC","pages":"299-310","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/OsmanDZ02","url":"https://dblp.org/rec/conf/sec/OsmanDZ02"}, "url":"URL#6304683" }, { "@score":"1", "@id":"6304684", "info":{"authors":{"author":[{"@pid":"73/6934","text":"Roberto Di Pietro"},{"@pid":"55/6061","text":"Luigi V. Mancini"},{"@pid":"j/SushilJajodia","text":"Sushil Jajodia"}]},"title":"Secure Selective Exclusion in Ad Hoc Wireless Network.","venue":"SEC","pages":"423-434","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/PietroMJ02","url":"https://dblp.org/rec/conf/sec/PietroMJ02"}, "url":"URL#6304684" }, { "@score":"1", "@id":"6304685", "info":{"authors":{"author":[{"@pid":"13/6156","text":"D. Salah"},{"@pid":"47/2532","text":"Heba Kamal Aslan"},{"@pid":"63/6762","text":"Mahmoud T. El-Hadidi"}]},"title":"A Detection Scheme for the SK Virus.","venue":"SEC","pages":"171-182","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/SalahAE02","url":"https://dblp.org/rec/conf/sec/SalahAE02"}, "url":"URL#6304685" }, { "@score":"1", "@id":"6304686", "info":{"authors":{"author":[{"@pid":"67/2291","text":"Thomas Schlienger"},{"@pid":"t/StephanieTeufel","text":"Stephanie Teufel"}]},"title":"Information Security Culture: The Socio-Cultural Dimension in Information Security Management.","venue":"SEC","pages":"191-202","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/SchliengerT02","url":"https://dblp.org/rec/conf/sec/SchliengerT02"}, "url":"URL#6304686" }, { "@score":"1", "@id":"6304687", "info":{"authors":{"author":{"@pid":"80/6493","text":"Mikko T. Siponen"}},"title":"Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects.","venue":"SEC","pages":"91-108","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/Siponen02","url":"https://dblp.org/rec/conf/sec/Siponen02"}, "url":"URL#6304687" }, { "@score":"1", "@id":"6304688", "info":{"authors":{"author":[{"@pid":"79/5323","text":"Kenneth P. Smith"},{"@pid":"46/4674","text":"Donald B. Faatz"},{"@pid":"49/4272","text":"Amgad Fayad"},{"@pid":"j/SushilJajodia","text":"Sushil Jajodia"}]},"title":"Propagating Modifications to Mobile Policies.","venue":"SEC","pages":"573-584","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/SmithFFJ02","url":"https://dblp.org/rec/conf/sec/SmithFFJ02"}, "url":"URL#6304688" }, { "@score":"1", "@id":"6304689", "info":{"authors":{"author":[{"@pid":"03/4038","text":"Theodore Tryfonas"},{"@pid":"11/599","text":"Evangelos A. Kiountouzis"}]},"title":"Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration.","venue":"SEC","pages":"347-356","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/TryfonasK02","url":"https://dblp.org/rec/conf/sec/TryfonasK02"}, "url":"URL#6304689" }, { "@score":"1", "@id":"6304690", "info":{"authors":{"author":[{"@pid":"36/4597","text":"Ryuya Uda"},{"@pid":"88/1690","text":"Masahito Ito"},{"@pid":"64/958","text":"Kohei Awaya"},{"@pid":"40/296","text":"Hiroshi Shigeno"},{"@pid":"12/1996","text":"Yutaka Matsushita"}]},"title":"E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals.","venue":"SEC","pages":"399-410","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/UdaIASM02","url":"https://dblp.org/rec/conf/sec/UdaIASM02"}, "url":"URL#6304690" }, { "@score":"1", "@id":"6304691", "info":{"authors":{"author":[{"@pid":"31/5806","text":"Teemupekka Virtanen"},{"@pid":"10/1302","text":"Ronja Addams-Moring"}]},"title":"An Information Security Curriculum in Finland.","venue":"SEC","pages":"183-190","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/VirtanenA02","url":"https://dblp.org/rec/conf/sec/VirtanenA02"}, "url":"URL#6304691" }, { "@score":"1", "@id":"6304692", "info":{"authors":{"author":[{"@pid":"33/5378","text":"Cheryl Vroom"},{"@pid":"89/3539","text":"Rossouw von Solms"}]},"title":"A Practical Approach to Information Security Awareness in the Organization.","venue":"SEC","pages":"19-38","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/VroomS02","url":"https://dblp.org/rec/conf/sec/VroomS02"}, "url":"URL#6304692" }, { "@score":"1", "@id":"6304693", "info":{"authors":{"author":[{"@pid":"w/CarlaMerkleWestphall","text":"Carla Merkle Westphall"},{"@pid":"257/5489","text":"Joni da Silva Fraga"},{"@pid":"b/CarlosBeckerWestphall","text":"Carlos Becker Westphall"},{"@pid":"83/5999","text":"S. C. S. Bianchi"}]},"title":"Mandatory Security Policies for CORBA Security Model.","venue":"SEC","pages":"251-262","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/WestphallFWB02","url":"https://dblp.org/rec/conf/sec/WestphallFWB02"}, "url":"URL#6304693" }, { "@score":"1", "@id":"6304694", "info":{"authors":{"author":[{"@pid":"w/CarlaMerkleWestphall","text":"Carla Merkle Westphall"},{"@pid":"257/5489","text":"Joni da Silva Fraga"},{"@pid":"82/6811","text":"Michelle S. Wangham"},{"@pid":"91/1540","text":"Rafael R. Obelheiro"},{"@pid":"65/85","text":"Lau Cheuk Lung"}]},"title":"Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security.","venue":"SEC","pages":"263-274","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/WestphallFWOL02","url":"https://dblp.org/rec/conf/sec/WestphallFWOL02"}, "url":"URL#6304694" }, { "@score":"1", "@id":"6304695", "info":{"authors":{"author":{"@pid":"14/4344","text":"Simeon Xenitellis"}},"title":"Security Vulnerabilities in Event-Driven Systems.","venue":"SEC","pages":"147-160","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/Xenitellis02","url":"https://dblp.org/rec/conf/sec/Xenitellis02"}, "url":"URL#6304695" }, { "@score":"1", "@id":"6304696", "info":{"authors":{"author":{"@pid":"83/3055","text":"J. J. Yan"}},"title":"Denial of Service: Another Example.","venue":"SEC","pages":"161-170","year":"2002","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/sec/Yan02","url":"https://dblp.org/rec/conf/sec/Yan02"}, "url":"URL#6304696" }, { "@score":"1", "@id":"6313289", "info":{"authors":{"author":[{"@pid":"55/1859","text":"Adeeb Ghonaimy"},{"@pid":"63/6762","text":"Mahmoud T. El-Hadidi"},{"@pid":"47/2532","text":"Heba Kamal Aslan"}]},"title":"Security in the Information Society: Visions and Perspectives, IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt","venue":["SEC","IFIP Conference Proceedings"],"volume":"214","publisher":"Kluwer","year":"2002","type":"Editorship","access":"unavailable","key":"conf/sec/2002","url":"https://dblp.org/rec/conf/sec/2002"}, "url":"URL#6313289" } ] } } } )