default search action
SEC 2001: Paris, France
- Michel Dupuy, Pierre Paradinas:
Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France. IFIP Conference Proceedings 193, Kluwer 2001, ISBN 0-7923-7389-8
eSociety
- Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos:
Pythia: Towards Anonymity in Authentication. SEC 2001: 1-18 - Kok Ming Ang, William J. Caelli:
Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? SEC 2001: 19-34 - Claudia Eckert, A. Pircher:
Internet Anonymity: Problems and Solutions. SEC 2001: 35-50
TTP Management and PKI
- Albert Levi, Çetin Kaya Koç:
Reducing Certificate Revocating Cost using NPKI. SEC 2001: 51-60 - Bernd Blobel, Peter Pharow:
The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems. SEC 2001: 61-76
Smart Card
- Constantinos Markantonakis:
Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? SEC 2001: 77-92 - Jan Jürjens:
Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC. 93-108
Security Protocols
- Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:
Strong Forward Security. 109-122 - Annalisa De Bonis, Alfredo De Santis:
Secret Sharing and Visual Cryptography Schemes. SEC 2001: 123-138 - Alban Gabillon, Jungsoo Byun:
A Two-level Time-Stamping System. SEC 2001: 139-150 - Olivier Pereira, Jean-Jacques Quisquater:
Security Analysis of the Cliques Protocols Suites: First Results. SEC 2001: 151-166
Secure Workflow Environment
- Joon S. Park, Myong H. Kang, Judith N. Froscher:
A Secure Workflow System for Dynamic Collaboration. SEC 2001: 167-182 - T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker:
On Securely Scheduling a Meeting. SEC 2001: 183-198 - Konstantin Knorr, Henrik Stormer:
Modeling and Analyzing Separation of Duties in Workflow Environments. 199-212
Secure Group Communications
- Thomas Hardjono, Mark Baugher, Hugh Harney:
Group Security Association (GSA) Management in IP Multicast. SEC 2001: 213-228 - Yongdae Kim, Adrian Perrig, Gene Tsudik:
Communication-Efficient Group Key Agreement. SEC 2001: 229-244
Security Policies
- Amgad Fayad, Sushil Jajodia, Donald B. Faatz, Vinti Doshi:
Going Beyond MAC and DAC Using Mobile Policies. SEC 2001: 245-260 - Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
An Access Control Model for Data Archives. SEC 2001: 261-276
Risk Management
- Sungbaek Cho, Zbigniew Ciechanowicz:
Checklist-Based Risk Analysis with Evidential Reasoning. SEC 2001: 277-292 - Ann Frisinger:
Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis. SEC 2001: 293-304 - Teemupekka Virtanen:
The Security Model to Combine the Corporate and Information Security. SEC 2001: 305-316 - Teemupekka Virtanen:
Design Criteria to Classified Information Systems Numerically. SEC 2001: 317-326
Network Security and Intrusion Detection
- Matthew J. Warren, William Hutchinson:
Deception: A Tool and Curse for Security Management. SEC 2001: 327-338 - Alexandr Seleznyov:
A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection. SEC 2001: 339-352 - Cédric Michel, Ludovic Mé:
ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection. SEC 2001: 353-368 - Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill:
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. SEC 2001: 369-384
Trusted Platforms
- Antonio Mana, Ernesto Pimentel:
An Efficient Software Protection Scheme. SEC 2001: 385-402 - Adrian Spalka, Armin B. Cremers, Hanno Langweg:
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs. SEC 2001: 403-420
Trusted System Design and Management
- Theodore Tryfonas, Evangelos A. Kiountouzis:
Security Concerns for Contemporary Development Practices: A Case Study. 421-436 - Mikko T. Siponen:
A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS. 437-452 - Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Redefining Information Systems Security: Viable Information Systems. SEC 2001: 453-468 - Guido Wimmel, Alexander K. Wißpeintner:
Extended Description Techniques for Security Engineering. 469-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.