Coimbra: secure Web access to multimedia content
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
The architecture of robust publishing systems
ACM Transactions on Internet Technology (TOIT)
Five dimensions of information security awareness
ACM SIGCAS Computers and Society
A task-based security model to facilitate collaboration in trusted multi-agency networks
Proceedings of the 2002 ACM symposium on Applied computing
A paradigmatic analysis of conventional approaches for developing and managing secure IS
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
The JavaSeal Mobile Agent Kernel
Autonomous Agents and Multi-Agent Systems
Trust Objects in Electronic Commerce Transactions
OOIS '02 Proceedings of the 8th International Conference on Object-Oriented. Information Systems
Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Reasoning about Security in Mobile Ambients
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
Formal Methods for Industrial Products
ZB '00 Proceedings of the First International Conference of B and Z Users on Formal Specification and Development in Z and B
A Formal Analysis of the CORBA Security Service
ZB '02 Proceedings of the 2nd International Conference of B and Z Users on Formal Specification and Development in Z and B
CoSMo: An Approach Towards Conceptual Security Modeling
DEXA '02 Proceedings of the 13th International Conference on Database and Expert Systems Applications
Segregation with Communication
ZB '00 Proceedings of the First International Conference of B and Z Users on Formal Specification and Development in Z and B
A social perspective on information security: theoretically grounding the domain
Socio-technical and human cognition elements of information systems
Results of classroom enterprise security assessment of five large enterprise networks
Journal of Computing Sciences in Colleges
Laboratory exercises for a computer security course
Journal of Computing Sciences in Colleges
Scale and performance in the Denali isolation kernel
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Information security fundamentals
Security education and critical infrastructures
A dedicated undergraduate track in computer security education
Security education and critical infrastructures
Network solutions for home health care applications
Technology and Health Care
New challenges in privacy protection
Advanced topics in global information management
An undergraduate track in computer security
Proceedings of the 8th annual conference on Innovation and technology in computer science education
Security in the Web Services Framework
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Access control for mobile agents: The calculus of boxed ambients
ACM Transactions on Programming Languages and Systems (TOPLAS)
Algebraic Signatures for Scalable Distributed Data Structures
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Enhanced Security Models for Operating Systems: A Cryptographic Approach
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Embedding information security curricula in existing programmes
Proceedings of the 1st annual conference on Information security curriculum development
Building an information security education program
Proceedings of the 1st annual conference on Information security curriculum development
Scale and performance in the Denali isolation kernel
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Support for multi-level security policies in DRM architectures
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
A teaching module to introduce encryption for web users
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Denali: a scalable isolation kernel
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Mitigating denial of service attacks: a tutorial
Journal of Computer Security
Managing user relationships in hierarchies for information system security
Decision Support Systems
Question-based group authentication
OZCHI '06 Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments
Heuristics for Safety and Security Constraints
Electronic Notes in Theoretical Computer Science (ENTCS)
eBPSM: a new security paradigm for e-business organisations (e-business process security model)
Proceedings of the ninth international conference on Electronic commerce
Reducing inference control to access control for normalized database schemas
Information Processing Letters
Taming the diversity of information assurance & security
Journal of Computing Sciences in Colleges
Integrating security and usability into the requirements and design process
International Journal of Electronic Security and Digital Forensics
Secure information systems engineering: a manifesto
International Journal of Electronic Security and Digital Forensics
Information Systems Security
Proceedings of the 4th symposium on Usable privacy and security
The virtual public servant: Ireland's public services broker
Information Polity
The panoptic state: Privacy, surveillance and the balance of risk
Information Polity - Public Administration in the Information Society: Essays in Risk and Trust
Even more patterns for secure operating systems
Proceedings of the 2006 conference on Pattern languages of programs
Patterns and Pattern Diagrams for Access Control
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Strategic planning for the computer science security
WSEAS Transactions on Computers
Knowledge-Based Systems
Breaking the Model: Finalisation and a Taxonomy of Security Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
Continuous-Time Probabilistic KLAIM
Electronic Notes in Theoretical Computer Science (ENTCS)
Keystroke-based authentication by key press intervals as a complementary behavioral biometric
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Modeling and simulation of distributed security models
ICCS'03 Proceedings of the 2003 international conference on Computational science
From weak to strong watermarking
TCC'07 Proceedings of the 4th conference on Theory of cryptography
COORDINATION'08 Proceedings of the 10th international conference on Coordination models and languages
Foundations of security analysis and design IV
BANBAD - A Centralized belief-networks-based anomaly detection algorithm for MANETs
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Non-repudiation analysis using LySa with annotations
Computer Languages, Systems and Structures
Component security: issues and an approach
COMPSAC-W'05 Proceedings of the 29th annual international conference on Computer software and applications conference
A controlled natural language interface for authoring access control policies
Proceedings of the 2011 ACM Symposium on Applied Computing
Statistical model applied to netflow for network intrusion detection
Transactions on computational science XI
Information Sciences: an International Journal
A security architecture for adapting multiple access control models to operating systems
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Secure payment protocol for healthcare using USIM in ubiquitous
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Choreographing security and performance analysis for web services
EPEW'05/WS-FM'05 Proceedings of the 2005 international conference on European Performance Engineering, and Web Services and Formal Methods, international conference on Formal Techniques for Computer Systems and Business Processes
On lattices in access control models
ICCS'06 Proceedings of the 14th international conference on Conceptual Structures: inspiration and Application
An algebraic basis for specifying and enforcing access control in security systems
IW-FM'00 Proceedings of the 4th Irish conference on Formal Methods
Authorization architectures for privacy-respecting surveillance
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |