About the Buildings' Danger Control Systems Vulnerabilities
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part III
Engineering of Software-Intensive Systems: State of the Art and Research Challenges
Software-Intensive Systems and New Computing Paradigms
THE WAY I SEE IT: When security gets in the way
interactions - Catalyzing a Perfect Storm
KES '09 Proceedings of the 13th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems: Part II
StemCerts-2: pairs of X.509 v3 certificates for greater security, flexibility and convenience
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Trust-based anonymity framework for wireless mesh networks
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
What is the shape of your security policy?: security as a classification problem
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Certification and evaluation: a security economics perspective
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
Integrating security and systems engineering: towards the modelling of secure information systems
CAiSE'03 Proceedings of the 15th international conference on Advanced information systems engineering
Compressed sensing for synthetic aperture radar imaging
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Towards micro architecture for security adaptation
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Using formal methods for security in the Xenon project
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Security engineering for embedded systems: the SecFutur vision
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
Controlling security of software development with multi-agent system
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part IV
On the impossibility of cryptography alone for privacy-preserving cloud computing
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Cross-organizational security - the service-oriented difference
ICSOC/ServiceWave'09 Proceedings of the 2009 international conference on Service-oriented computing
On device identity establishment and verification
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
A tool-supported method for the design and implementation of secure distributed applications
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
SIMPL systems, or: can we design cryptographic hardware without secret key information?
SOFSEM'11 Proceedings of the 37th international conference on Current trends in theory and practice of computer science
An approach for adapting moodle into a secure infrastructure
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
UAHCI'11 Proceedings of the 6th international conference on Universal access in human-computer interaction: users diversity - Volume Part II
Statistical analysis for comparison of the key representation database with the original database
International Journal of Business Information Systems
Problems of Information Transmission
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
A note on a privacy-preserving distance-bounding protocol
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Proceedings of the Seventh Symposium on Usable Privacy and Security
Poster: preliminary analysis of Google+'s privacy
Proceedings of the 18th ACM conference on Computer and communications security
Expert Systems with Applications: An International Journal
SIMPL systems as a keyless cryptographic and security primitive
Cryptography and Security
Might financial cryptography kill financial innovation? --- the curious case of EMV
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Frends Technology Company: a case study of Biztalk Server - a strategic Microsoft technology
International Journal of Business Information Systems
Trust areas: a security paradigm for the future internet
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Security analysis of a multi-factor authenticated key exchange protocol
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Gone in 360 seconds: Hijacking with Hitag2
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Non-interference on UML state-charts
TOOLS'12 Proceedings of the 50th international conference on Objects, Models, Components, Patterns
Journal of Computer and System Sciences
Towards secure time-triggered systems
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
Security economics: a personal perspective
Proceedings of the 28th Annual Computer Security Applications Conference
Separation virtual machine monitors
Proceedings of the 28th Annual Computer Security Applications Conference
Understanding the weaknesses of human-protocol interaction
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Secure and Private Service Discovery in Pervasive Computing Environments
International Journal of Advanced Pervasive and Ubiquitous Computing
Approaches to modelling security scenarios with domain-specific languages
SP'12 Proceedings of the 20th international conference on Security Protocols
Usable privacy by visual and interactive control of information flow
SP'12 Proceedings of the 20th international conference on Security Protocols
Goals and Practices in Maintaining Information Systems Security
International Journal of Information Security and Privacy
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 2nd ACM international conference on High confidence networked systems
Least-restrictive enforcement of the Chinese wall security policy
Proceedings of the 18th ACM symposium on Access control models and technologies
Breaking and entering through the silicon
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
An empirical study of three access control systems
Proceedings of the 6th International Conference on Security of Information and Networks
Approximation of sets based on partial covering
Transactions on Rough Sets XVI
Information and Software Technology
An extensible pattern-based library and taxonomy of security threats for distributed systems
Computer Standards & Interfaces
Hi-index | 0.01 |
Gigantically comprehensive and carefully researched, Security Engineering makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice. Better, Ross Anderson offers a lot of thoughts on how information can be made more secure (though probably not absolutely secure, at least not forever) with the help of both technologies and management strategies. His work makes fascinating reading and will no doubt inspire considerable doubt--fear is probably a better choice of words--in anyone with information to gather, protect, or make decisions about. Be aware: This is absolutely not a book solely about computers, with yet another explanation of Alice and Bob and how they exchange public keys in order to exchange messages in secret. Anderson explores, for example, the ingenious ways in which European truck drivers defeat their vehicles' speed-logging equipment. In another section, he shows how the end of the cold war brought on a decline in defenses against radio-frequency monitoring (radio frequencies can be used to determine, at a distance, what's going on in systems--bank teller machines, say), and how similar technology can be used to reverse-engineer the calculations that go on inside smart cards. In almost 600 pages of riveting detail, Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. A terrific read for security professionals and general readers alike. --David Wall Topics covered: How some people go about protecting valuable things (particularly, but not exclusively, information) and how other people go about getting it anyway. Mostly, this takes the form of essays (about, for example, how the U.S. Air Force keeps its nukes out of the wrong hands) and stories (one of which tells of an art thief who defeated the latest technology by hiding in a closet). Sections deal with technologies, policies, psychology, and legal matters.