Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr9.bht:"
@article{DBLP:journals/istr/ArdagnaDVS04, author = {Claudio A. Ardagna and Ernesto Damiani and Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {XML-based access control languages}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {3}, pages = {35--46}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00030-5}, doi = {10.1016/S1363-4127(04)00030-5}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ArdagnaDVS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Babb04, author = {Derek Babb}, title = {User requirements for security in wireless mobile systems}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {4}, pages = {51--59}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(05)70040-6}, doi = {10.1016/S1363-4127(05)70040-6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Babb04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BertinoCF04, author = {Elisa Bertino and Barbara Carminati and Elena Ferrari}, title = {Access control for {XML} documents and data}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {3}, pages = {19--34}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00029-9}, doi = {10.1016/S1363-4127(04)00029-9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BertinoCF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Brown04, author = {Geoff Brown}, title = {The use of hardware tokens for identity management}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {1}, pages = {22--25}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00012-3}, doi = {10.1016/S1363-4127(04)00012-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Brown04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Crampton04, author = {Jason Crampton}, title = {Introduction}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {3}, pages = {5}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00027-5}, doi = {10.1016/S1363-4127(04)00027-5}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Crampton04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Demchenko04, author = {Yuri Demchenko}, title = {Virtual organisations in computer grids and identity management}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {1}, pages = {59--76}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00016-0}, doi = {10.1016/S1363-4127(04)00016-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Demchenko04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Dodgson04, author = {Terence E. Dodgson}, title = {Mobile terminal security and tracking}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {4}, pages = {60--80}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(05)70041-8}, doi = {10.1016/S1363-4127(05)70041-8}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Dodgson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Ford04, author = {Richard Ford}, title = {The future of virus detection}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {2}, pages = {19--26}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00021-4}, doi = {10.1016/S1363-4127(04)00021-4}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Ford04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Fothergill04, author = {Shaun Fothergill}, title = {Business issues relating to malware}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {2}, pages = {65--75}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00026-3}, doi = {10.1016/S1363-4127(04)00026-3}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Fothergill04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Ganley04, author = {Michael J. Ganley}, title = {Introduction}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {2}, pages = {5}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00019-6}, doi = {10.1016/S1363-4127(04)00019-6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Ganley04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HansenBCCPW04, author = {Marit Hansen and Peter Berlich and Jan Camenisch and Sebastian Clau{\ss} and Andreas Pfitzmann and Michael Waidner}, title = {Privacy-enhancing identity management}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {1}, pages = {35--44}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00014-7}, doi = {10.1016/S1363-4127(04)00014-7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HansenBCCPW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Heiser04, author = {Jay G. Heiser}, title = {Understanding today's malware}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {2}, pages = {47--64}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00025-1}, doi = {10.1016/S1363-4127(04)00025-1}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Heiser04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Iannella04, author = {Renato Iannella}, title = {The Open Digital Rights Language: {XML} for Digital Rights Management}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {3}, pages = {47--55}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00031-7}, doi = {10.1016/S1363-4127(04)00031-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Iannella04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Irwin04, author = {James Irwin}, title = {Digital Rights Management: The Open Mobile Alliance {DRM} specifications}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {4}, pages = {22--31}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(05)70037-6}, doi = {10.1016/S1363-4127(05)70037-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Irwin04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KnospeP04, author = {Heiko Knospe and Hartmut Pohl}, title = {{RFID} security}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {4}, pages = {39--50}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(05)70039-X}, doi = {10.1016/S1363-4127(05)70039-X}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KnospeP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Lautenbach04, author = {Berin Lautenbach}, title = {Introduction to {XML} Encryption and {XML} Signature}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {3}, pages = {6--18}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00028-7}, doi = {10.1016/S1363-4127(04)00028-7}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Lautenbach04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Madsen04, author = {Paul Madsen}, title = {Federated identity and web services}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {3}, pages = {56--65}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00032-9}, doi = {10.1016/S1363-4127(04)00032-9}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Madsen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Michalek04, author = {Peter Michalek}, title = {Dissecting application security {XML} schemas: AVDL, WAS, {OVAL} - state of the {XML} security standards report}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {3}, pages = {66--76}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00033-0}, doi = {10.1016/S1363-4127(04)00033-0}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Michalek04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Niemi04, author = {Valtteri Niemi}, title = {Trends in mobile security standards}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {4}, pages = {32--38}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(05)70038-8}, doi = {10.1016/S1363-4127(05)70038-8}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Niemi04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Nikishin04, author = {Andrey Nikishin}, title = {Malicious software - past, present and future}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {2}, pages = {6--18}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00020-2}, doi = {10.1016/S1363-4127(04)00020-2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Nikishin04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Oppliger04, author = {Rolf Oppliger}, title = {Microsoft .NET Passport and identity management}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {1}, pages = {26--34}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00013-5}, doi = {10.1016/S1363-4127(04)00013-5}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Oppliger04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Pfitzmann04, author = {Birgit Pfitzmann}, title = {Privacy in enterprise identity federation - policies for Liberty 2 single sign on}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {1}, pages = {45--58}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00015-9}, doi = {10.1016/S1363-4127(04)00015-9}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Pfitzmann04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Rannenberg04, author = {Kai Rannenberg}, title = {Identity management in mobile cellular networks and related applications}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {1}, pages = {77--85}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00017-2}, doi = {10.1016/S1363-4127(04)00017-2}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Rannenberg04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Rautiainen04, author = {Sami Rautiainen}, title = {Sound of silence}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {2}, pages = {42--46}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00024-X}, doi = {10.1016/S1363-4127(04)00024-X}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Rautiainen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Schwiderski-Grosche04, author = {Scarlet Schwiderski{-}Grosche}, title = {Introduction}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {1}, pages = {5}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00010-X}, doi = {10.1016/S1363-4127(04)00010-X}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Schwiderski-Grosche04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Schwiderski-Grosche04a, author = {Scarlet Schwiderski{-}Grosche}, title = {Introduction}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {4}, pages = {5}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(05)70035-2}, doi = {10.1016/S1363-4127(05)70035-2}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Schwiderski-Grosche04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Small04, author = {Mike Small}, title = {Business and technical motivation for identity management}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {1}, pages = {6--21}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00011-1}, doi = {10.1016/S1363-4127(04)00011-1}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Small04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Sodhi04, author = {Gavenraj Sodhi}, title = {User provisioning with {SPML}}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {1}, pages = {86--96}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00018-4}, doi = {10.1016/S1363-4127(04)00018-4}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Sodhi04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Stewart04, author = {Joe Stewart}, title = {This business of malware}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {2}, pages = {35--41}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00023-8}, doi = {10.1016/S1363-4127(04)00023-8}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Stewart04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WalterBRHKPR04, author = {Thomas Walter and Laurent Bussard and Yves Roudier and Jochen Haller and Roger Kilian{-}Kehr and Joachim Posegga and Philip Robinson}, title = {Secure mobile business applications - framework, architecture and implementation}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {4}, pages = {6--21}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(05)70036-4}, doi = {10.1016/S1363-4127(05)70036-4}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WalterBRHKPR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Williamson04, author = {David Williamson}, title = {Deconstructing malware: what it is and how to stop it}, journal = {Inf. Secur. Tech. Rep.}, volume = {9}, number = {2}, pages = {27--34}, year = {2004}, url = {https://doi.org/10.1016/S1363-4127(04)00022-6}, doi = {10.1016/S1363-4127(04)00022-6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Williamson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.