Search dblp for Publications

export results for "toc:db/journals/istr/istr13.bht:"

 download as .bib file

@article{DBLP:journals/istr/Arora08,
  author       = {Siddhartha Arora},
  title        = {National e-ID card schemes: {A} European overview},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {2},
  pages        = {46--53},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.08.002},
  doi          = {10.1016/J.ISTR.2008.08.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Arora08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Ashenden08,
  author       = {Debi Ashenden},
  title        = {Information Security management: {A} human challenge?},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {4},
  pages        = {195--201},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.006},
  doi          = {10.1016/J.ISTR.2008.10.006},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Ashenden08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BrownP08,
  author       = {Mason Brown and
                  Alan Paller},
  title        = {Secure software development: Why the development world awoke to the
                  challenge},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {1},
  pages        = {40--43},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.03.001},
  doi          = {10.1016/J.ISTR.2008.03.001},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BrownP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChessW08,
  author       = {Brian Chess and
                  Jacob West},
  title        = {Dynamic taint propagation: Finding vulnerabilities without attacking},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {1},
  pages        = {33--39},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.02.003},
  doi          = {10.1016/J.ISTR.2008.02.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChessW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Cleeff08,
  author       = {Andr{\'{e}} van Cleeff},
  title        = {Future consumer mobile phone security: {A} case study using the data-centric
                  security model},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {3},
  pages        = {112--117},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.003},
  doi          = {10.1016/J.ISTR.2008.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Cleeff08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CockSP08,
  author       = {Danny De Cock and
                  Koen Simoens and
                  Bart Preneel},
  title        = {Insights on identity documents based on the Belgian case study},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {2},
  pages        = {54--60},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.06.004},
  doi          = {10.1016/J.ISTR.2008.06.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CockSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Coles-Kemp08,
  author       = {Lizzie Coles{-}Kemp},
  title        = {Introduction},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {4},
  pages        = {193--194},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.015},
  doi          = {10.1016/J.ISTR.2008.10.015},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Coles-Kemp08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Collings08,
  author       = {Tony Collings},
  title        = {Some thoughts on the underlying logic and process underpinning Electronic
                  Identity (e-ID)},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {2},
  pages        = {61--70},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.06.002},
  doi          = {10.1016/J.ISTR.2008.06.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Collings08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Crinson08,
  author       = {Iain Crinson},
  title        = {Assessing the 'insider-outsider threat' duality in the context of
                  the development of public-private partnerships delivering 'choice'
                  in healthcare services: {A} sociomaterial critique},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {4},
  pages        = {202--206},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.007},
  doi          = {10.1016/J.ISTR.2008.10.007},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Crinson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DesmetJMPPSV08,
  author       = {Lieven Desmet and
                  Wouter Joosen and
                  Fabio Massacci and
                  Pieter Philippaerts and
                  Frank Piessens and
                  Ida Sri Rejeki Siahaan and
                  Dries Vanoverberghe},
  title        = {Security-by-contract on the .NET platform},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {1},
  pages        = {25--32},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.02.001},
  doi          = {10.1016/J.ISTR.2008.02.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DesmetJMPPSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Ganley08,
  author       = {Michael J. Ganley},
  title        = {Introduction to this issue},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {2},
  pages        = {45},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.08.001},
  doi          = {10.1016/J.ISTR.2008.08.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Ganley08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Gollmann08,
  author       = {Dieter Gollmann},
  title        = {Securing Web applications},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {1},
  pages        = {1--9},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.02.002},
  doi          = {10.1016/J.ISTR.2008.02.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Gollmann08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HansenPS08,
  author       = {Marit Hansen and
                  Andreas Pfitzmann and
                  Sandra Steinbrecher},
  title        = {Identity management throughout one's whole life},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {2},
  pages        = {83--94},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.06.003},
  doi          = {10.1016/J.ISTR.2008.06.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HansenPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Hert08,
  author       = {Paul de Hert},
  title        = {Identity management of e-ID, privacy and security in Europe. {A} human
                  rights view},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {2},
  pages        = {71--75},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.07.001},
  doi          = {10.1016/J.ISTR.2008.07.001},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Hert08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Humphreys08,
  author       = {Edward Humphreys},
  title        = {Information security management standards: Compliance, governance
                  and risk management},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {4},
  pages        = {247--255},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.010},
  doi          = {10.1016/J.ISTR.2008.10.010},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Humphreys08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Jones08,
  author       = {Andy Jones},
  title        = {Catching the malicious insider},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {4},
  pages        = {220--224},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.008},
  doi          = {10.1016/J.ISTR.2008.10.008},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Jones08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KraussSE08,
  author       = {Christoph Krau{\ss} and
                  Markus Schneider and
                  Claudia Eckert},
  title        = {On handling insider attacks in wireless sensor networks},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {3},
  pages        = {165--172},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.011},
  doi          = {10.1016/J.ISTR.2008.10.011},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KraussSE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Leung08,
  author       = {Adrian Leung},
  title        = {A mobile device management framework for secure service delivery},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {3},
  pages        = {118--126},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.09.003},
  doi          = {10.1016/J.ISTR.2008.09.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Leung08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LoYY08,
  author       = {Nai{-}Wei Lo and
                  Kuo{-}Hui Yeh and
                  Chan Yeob Yeun},
  title        = {New mutual agreement protocol to secure mobile RFID-enabled devices},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {3},
  pages        = {151--157},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.09.002},
  doi          = {10.1016/J.ISTR.2008.09.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LoYY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MacDonald08,
  author       = {John A. MacDonald},
  title        = {Authentication {\&} key agreement for off-portal mobile applications},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {3},
  pages        = {127--135},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.004},
  doi          = {10.1016/J.ISTR.2008.10.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MacDonald08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MayesM08,
  author       = {Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {Mobile communication security controllers an evaluation paper},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {3},
  pages        = {173--192},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.09.004},
  doi          = {10.1016/J.ISTR.2008.09.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MayesM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MayrhoferG08,
  author       = {Rene Mayrhofer and
                  Hans Gellersen},
  title        = {Spontaneous mobile device authentication based on sensor data},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {3},
  pages        = {136--150},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.005},
  doi          = {10.1016/J.ISTR.2008.10.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MayrhoferG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/McDermottKMJK08,
  author       = {John P. McDermott and
                  James Kirby and
                  Bruce E. Montrose and
                  Travis Johnson and
                  Myong H. Kang},
  title        = {Re-engineering Xen internals for higher-assurance security},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {1},
  pages        = {17--24},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.01.001},
  doi          = {10.1016/J.ISTR.2008.01.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/McDermottKMJK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Myhr08,
  author       = {Thomas Myhr},
  title        = {Legal and organizational challenges and solutions for achieving a
                  pan-European electronic {ID} solution: or {I} am 621216-1318, but
                  {I} am also 161262-43774. Do you know who {I} am?},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {2},
  pages        = {76--82},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.06.001},
  doi          = {10.1016/J.ISTR.2008.06.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Myhr08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Overill08,
  author       = {Richard E. Overill},
  title        = {{ISMS} insider intrusion prevention and detection},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {4},
  pages        = {216--219},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.014},
  doi          = {10.1016/J.ISTR.2008.10.014},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Overill08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Price08,
  author       = {Geraint Price},
  title        = {The benefits and drawbacks of using electronic identities},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {2},
  pages        = {95--103},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.07.002},
  doi          = {10.1016/J.ISTR.2008.07.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Price08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ProbstH08,
  author       = {Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {An extensible analysable system model},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {4},
  pages        = {235--246},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.012},
  doi          = {10.1016/J.ISTR.2008.10.012},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ProbstH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SagliettiOP08,
  author       = {Francesca Saglietti and
                  Norbert Oster and
                  Florin Pinte},
  title        = {White and grey-box verification and validation approaches for safety-
                  and security-critical software systems},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {1},
  pages        = {10--16},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.03.002},
  doi          = {10.1016/J.ISTR.2008.03.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SagliettiOP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SteerP08,
  author       = {John Steer and
                  Ashish Popli},
  title        = {Building secure business applications at Microsoft},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {2},
  pages        = {105--110},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.04.001},
  doi          = {10.1016/J.ISTR.2008.04.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SteerP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Tomlinson08,
  author       = {Allan Tomlinson},
  title        = {Developments in mobile communications security},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {3},
  pages        = {111},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.001},
  doi          = {10.1016/J.ISTR.2008.10.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Tomlinson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Walker08,
  author       = {Terrence Walker},
  title        = {Practical management of malicious insider threat - An enterprise {CSIRT}
                  perspective},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {4},
  pages        = {225--234},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.013},
  doi          = {10.1016/J.ISTR.2008.10.013},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Walker08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Williams08,
  author       = {Patricia A. H. Williams},
  title        = {In a 'trusting' environment, everyone is responsible for information
                  security},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {4},
  pages        = {207--215},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.009},
  doi          = {10.1016/J.ISTR.2008.10.009},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Williams08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YeunHVK08,
  author       = {Chan Yeob Yeun and
                  Kyusuk Han and
                  Duc{-}Liem Vo and
                  Kwangjo Kim},
  title        = {Secure authenticated group key agreement protocol in the {MANET} environment},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {3},
  pages        = {158--164},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.002},
  doi          = {10.1016/J.ISTR.2008.10.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YeunHVK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics