Search dblp for Publications

export results for "toc:db/journals/istr/istr9.bht:"

 download as .bib file

@article{DBLP:journals/istr/ArdagnaDVS04,
  author       = {Claudio A. Ardagna and
                  Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {XML-based access control languages},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {3},
  pages        = {35--46},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00030-5},
  doi          = {10.1016/S1363-4127(04)00030-5},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ArdagnaDVS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Babb04,
  author       = {Derek Babb},
  title        = {User requirements for security in wireless mobile systems},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {4},
  pages        = {51--59},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(05)70040-6},
  doi          = {10.1016/S1363-4127(05)70040-6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Babb04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BertinoCF04,
  author       = {Elisa Bertino and
                  Barbara Carminati and
                  Elena Ferrari},
  title        = {Access control for {XML} documents and data},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {3},
  pages        = {19--34},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00029-9},
  doi          = {10.1016/S1363-4127(04)00029-9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BertinoCF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Brown04,
  author       = {Geoff Brown},
  title        = {The use of hardware tokens for identity management},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {1},
  pages        = {22--25},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00012-3},
  doi          = {10.1016/S1363-4127(04)00012-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Brown04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Crampton04,
  author       = {Jason Crampton},
  title        = {Introduction},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {3},
  pages        = {5},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00027-5},
  doi          = {10.1016/S1363-4127(04)00027-5},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Crampton04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Demchenko04,
  author       = {Yuri Demchenko},
  title        = {Virtual organisations in computer grids and identity management},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {1},
  pages        = {59--76},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00016-0},
  doi          = {10.1016/S1363-4127(04)00016-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Demchenko04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Dodgson04,
  author       = {Terence E. Dodgson},
  title        = {Mobile terminal security and tracking},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {4},
  pages        = {60--80},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(05)70041-8},
  doi          = {10.1016/S1363-4127(05)70041-8},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Dodgson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Ford04,
  author       = {Richard Ford},
  title        = {The future of virus detection},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {2},
  pages        = {19--26},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00021-4},
  doi          = {10.1016/S1363-4127(04)00021-4},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Ford04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Fothergill04,
  author       = {Shaun Fothergill},
  title        = {Business issues relating to malware},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {2},
  pages        = {65--75},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00026-3},
  doi          = {10.1016/S1363-4127(04)00026-3},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Fothergill04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Ganley04,
  author       = {Michael J. Ganley},
  title        = {Introduction},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {2},
  pages        = {5},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00019-6},
  doi          = {10.1016/S1363-4127(04)00019-6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Ganley04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HansenBCCPW04,
  author       = {Marit Hansen and
                  Peter Berlich and
                  Jan Camenisch and
                  Sebastian Clau{\ss} and
                  Andreas Pfitzmann and
                  Michael Waidner},
  title        = {Privacy-enhancing identity management},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {1},
  pages        = {35--44},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00014-7},
  doi          = {10.1016/S1363-4127(04)00014-7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HansenBCCPW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Heiser04,
  author       = {Jay G. Heiser},
  title        = {Understanding today's malware},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {2},
  pages        = {47--64},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00025-1},
  doi          = {10.1016/S1363-4127(04)00025-1},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Heiser04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Iannella04,
  author       = {Renato Iannella},
  title        = {The Open Digital Rights Language: {XML} for Digital Rights Management},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {3},
  pages        = {47--55},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00031-7},
  doi          = {10.1016/S1363-4127(04)00031-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Iannella04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Irwin04,
  author       = {James Irwin},
  title        = {Digital Rights Management: The Open Mobile Alliance {DRM} specifications},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {4},
  pages        = {22--31},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(05)70037-6},
  doi          = {10.1016/S1363-4127(05)70037-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Irwin04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KnospeP04,
  author       = {Heiko Knospe and
                  Hartmut Pohl},
  title        = {{RFID} security},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {4},
  pages        = {39--50},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(05)70039-X},
  doi          = {10.1016/S1363-4127(05)70039-X},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KnospeP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Lautenbach04,
  author       = {Berin Lautenbach},
  title        = {Introduction to {XML} Encryption and {XML} Signature},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {3},
  pages        = {6--18},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00028-7},
  doi          = {10.1016/S1363-4127(04)00028-7},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Lautenbach04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Madsen04,
  author       = {Paul Madsen},
  title        = {Federated identity and web services},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {3},
  pages        = {56--65},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00032-9},
  doi          = {10.1016/S1363-4127(04)00032-9},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Madsen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Michalek04,
  author       = {Peter Michalek},
  title        = {Dissecting application security {XML} schemas: AVDL, WAS, {OVAL} -
                  state of the {XML} security standards report},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {3},
  pages        = {66--76},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00033-0},
  doi          = {10.1016/S1363-4127(04)00033-0},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Michalek04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Niemi04,
  author       = {Valtteri Niemi},
  title        = {Trends in mobile security standards},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {4},
  pages        = {32--38},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(05)70038-8},
  doi          = {10.1016/S1363-4127(05)70038-8},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Niemi04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Nikishin04,
  author       = {Andrey Nikishin},
  title        = {Malicious software - past, present and future},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {2},
  pages        = {6--18},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00020-2},
  doi          = {10.1016/S1363-4127(04)00020-2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Nikishin04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Oppliger04,
  author       = {Rolf Oppliger},
  title        = {Microsoft .NET Passport and identity management},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {1},
  pages        = {26--34},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00013-5},
  doi          = {10.1016/S1363-4127(04)00013-5},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Oppliger04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Pfitzmann04,
  author       = {Birgit Pfitzmann},
  title        = {Privacy in enterprise identity federation - policies for Liberty 2
                  single sign on},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {1},
  pages        = {45--58},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00015-9},
  doi          = {10.1016/S1363-4127(04)00015-9},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Pfitzmann04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Rannenberg04,
  author       = {Kai Rannenberg},
  title        = {Identity management in mobile cellular networks and related applications},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {1},
  pages        = {77--85},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00017-2},
  doi          = {10.1016/S1363-4127(04)00017-2},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Rannenberg04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Rautiainen04,
  author       = {Sami Rautiainen},
  title        = {Sound of silence},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {2},
  pages        = {42--46},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00024-X},
  doi          = {10.1016/S1363-4127(04)00024-X},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Rautiainen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Schwiderski-Grosche04,
  author       = {Scarlet Schwiderski{-}Grosche},
  title        = {Introduction},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {1},
  pages        = {5},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00010-X},
  doi          = {10.1016/S1363-4127(04)00010-X},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Schwiderski-Grosche04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Schwiderski-Grosche04a,
  author       = {Scarlet Schwiderski{-}Grosche},
  title        = {Introduction},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {4},
  pages        = {5},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(05)70035-2},
  doi          = {10.1016/S1363-4127(05)70035-2},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Schwiderski-Grosche04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Small04,
  author       = {Mike Small},
  title        = {Business and technical motivation for identity management},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {1},
  pages        = {6--21},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00011-1},
  doi          = {10.1016/S1363-4127(04)00011-1},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Small04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Sodhi04,
  author       = {Gavenraj Sodhi},
  title        = {User provisioning with {SPML}},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {1},
  pages        = {86--96},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00018-4},
  doi          = {10.1016/S1363-4127(04)00018-4},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Sodhi04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Stewart04,
  author       = {Joe Stewart},
  title        = {This business of malware},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {2},
  pages        = {35--41},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00023-8},
  doi          = {10.1016/S1363-4127(04)00023-8},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Stewart04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WalterBRHKPR04,
  author       = {Thomas Walter and
                  Laurent Bussard and
                  Yves Roudier and
                  Jochen Haller and
                  Roger Kilian{-}Kehr and
                  Joachim Posegga and
                  Philip Robinson},
  title        = {Secure mobile business applications - framework, architecture and
                  implementation},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {4},
  pages        = {6--21},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(05)70036-4},
  doi          = {10.1016/S1363-4127(05)70036-4},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WalterBRHKPR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Williamson04,
  author       = {David Williamson},
  title        = {Deconstructing malware: what it is and how to stop it},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {9},
  number       = {2},
  pages        = {27--34},
  year         = {2004},
  url          = {https://doi.org/10.1016/S1363-4127(04)00022-6},
  doi          = {10.1016/S1363-4127(04)00022-6},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Williamson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics