Search dblp for Publications

export results for "toc:db/journals/ijics/ijics1.bht:"

 download as .bib file

@article{DBLP:journals/ijics/AliO07,
  author       = {Khidir M. Ali and
                  Thomas J. Owens},
  title        = {Selection of an {EAP} authentication method for a {WLAN}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {210--233},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012251},
  doi          = {10.1504/IJICS.2007.012251},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AliO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AtluriC07,
  author       = {Vijayalakshmi Atluri and
                  Soon Ae Chun},
  title        = {A geotemporal role-based authorisation system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {143--168},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012247},
  doi          = {10.1504/IJICS.2007.012247},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AtluriC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AwasthiK07,
  author       = {Lalit Kumar Awasthi and
                  Prashant Kumar},
  title        = {A synchronous checkpointing protocol for mobile distributed systems:
                  probabilistic approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {298--314},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013957},
  doi          = {10.1504/IJICS.2007.013957},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AwasthiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Bolan07,
  author       = {Christopher Bolan},
  title        = {Radio Frequency Identification: a review of low cost tag security
                  proposals},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {391--399},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015500},
  doi          = {10.1504/IJICS.2007.015500},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Bolan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChangC07,
  author       = {Ya{-}Fen Chang and
                  Chin{-}Chen Chang},
  title        = {An RSA-based (t, n) threshold proxy signature scheme with freewill
                  identities},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {201--209},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012250},
  doi          = {10.1504/IJICS.2007.012250},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChangC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DamianiBP07,
  author       = {Maria Luisa Damiani and
                  Elisa Bertino and
                  Paolo Perlasca},
  title        = {Data security in location-aware applications: an approach based on
                  {RBAC}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {5--38},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012243},
  doi          = {10.1504/IJICS.2007.012243},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DamianiBP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DuLW07,
  author       = {Timon C. Du and
                  Eldon Y. Li and
                  Jacqueline W. Wong},
  title        = {Document access control in organisational workflows},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {437--454},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015504},
  doi          = {10.1504/IJICS.2007.015504},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DuLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HelmerWSHMWWS07,
  author       = {Guy G. Helmer and
                  Johnny Wong and
                  Mark Slagell and
                  Vasant G. Honavar and
                  Les Miller and
                  Yanxin Wang and
                  Xia Wang and
                  Natalia Stakhanova},
  title        = {Software fault tree and coloured Petri net-based specification, design
                  and implementation of agent-based intrusion detection systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {109--142},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012246},
  doi          = {10.1504/IJICS.2007.012246},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HelmerWSHMWWS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Hutchinson07,
  author       = {William Hutchinson},
  title        = {An information-centric and proactive approach to Information Security
                  teaching},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {369--377},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015498},
  doi          = {10.1504/IJICS.2007.015498},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Hutchinson07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/IndrakantiVA07,
  author       = {Sarath Indrakanti and
                  Vijay Varadharajan and
                  Ritesh Agarwal},
  title        = {On the design, implementation and application of an authorisation
                  architecture for web services},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {64--108},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012245},
  doi          = {10.1504/IJICS.2007.012245},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/IndrakantiVA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JansenGS07,
  author       = {Wayne A. Jansen and
                  Serban I. Gavrila and
                  Cl{\'{e}}ment S{\'{e}}veillac},
  title        = {Smart Cards for mobile devices},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {400--413},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015501},
  doi          = {10.1504/IJICS.2007.015501},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JansenGS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JohnsonS07,
  author       = {Robert Johnson and
                  Jessica Staddon},
  title        = {Deflation-secure web metering},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {39--63},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012244},
  doi          = {10.1504/IJICS.2007.012244},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JohnsonS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Kondakci07,
  author       = {Suleyman Kondakci},
  title        = {A new assessment and improvement model of risk propagation in information
                  security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {341--366},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013959},
  doi          = {10.1504/IJICS.2007.013959},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Kondakci07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LuiHY07,
  author       = {Richard W. C. Lui and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Accountability in organisations},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {237--255},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013954},
  doi          = {10.1504/IJICS.2007.013954},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LuiHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PirzadaM07,
  author       = {Asad Amir Pirzada and
                  Chris McDonald},
  title        = {Collaborative Dynamic Source Routing using transitional trust filters},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {278--297},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013956},
  doi          = {10.1504/IJICS.2007.013956},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PirzadaM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PyeW07,
  author       = {Graeme Pye and
                  Matthew J. Warren},
  title        = {E-business security benchmarking: a model and framework},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {378--390},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015499},
  doi          = {10.1504/IJICS.2007.015499},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PyeW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/StakhanovaBW07,
  author       = {Natalia Stakhanova and
                  Samik Basu and
                  Johnny Wong},
  title        = {A taxonomy of intrusion response systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {169--184},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012248},
  doi          = {10.1504/IJICS.2007.012248},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/StakhanovaBW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Valli07,
  author       = {Craig Valli},
  title        = {Honeypot technologies and their applicability as a strategic internal
                  countermeasure},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {430--436},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015503},
  doi          = {10.1504/IJICS.2007.015503},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Valli07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Wang0L07,
  author       = {Alex Hai Wang and
                  Peng Liu and
                  Lunquan Li},
  title        = {Evaluating the survivability of Intrusion Tolerant Database systems
                  and the impact of intrusion detection deficiencies},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {315--340},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013958},
  doi          = {10.1504/IJICS.2007.013958},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Wang0L07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangSM07,
  author       = {Chiou{-}Pirng Wang and
                  Don Snyder and
                  Kathaleena Monds},
  title        = {A conceptual framework for curbing the epidemic of information malice:
                  e-hygiene model with a human-factor approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {455--465},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015505},
  doi          = {10.1504/IJICS.2007.015505},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Williams07,
  author       = {Patricia A. H. Williams},
  title        = {Medical data security: Are you informed or afraid?},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {414--429},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015502},
  doi          = {10.1504/IJICS.2007.015502},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Williams07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YangY07,
  author       = {Lili Yang and
                  Shuang{-}Hua Yang},
  title        = {A framework of security and safety checking for internet-based control
                  systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {185--200},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012249},
  doi          = {10.1504/IJICS.2007.012249},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YangY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YuSG07,
  author       = {Zhen Yu and
                  William Sears and
                  Yong Guan},
  title        = {PeerCredential: a reputation-based trust framework for Peer-to-Peer
                  applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {256--277},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013955},
  doi          = {10.1504/IJICS.2007.013955},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YuSG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}