default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics1.bht:"
@article{DBLP:journals/ijics/AliO07, author = {Khidir M. Ali and Thomas J. Owens}, title = {Selection of an {EAP} authentication method for a {WLAN}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {210--233}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012251}, doi = {10.1504/IJICS.2007.012251}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AliO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AtluriC07, author = {Vijayalakshmi Atluri and Soon Ae Chun}, title = {A geotemporal role-based authorisation system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {143--168}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012247}, doi = {10.1504/IJICS.2007.012247}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AtluriC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AwasthiK07, author = {Lalit Kumar Awasthi and Prashant Kumar}, title = {A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {298--314}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013957}, doi = {10.1504/IJICS.2007.013957}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AwasthiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Bolan07, author = {Christopher Bolan}, title = {Radio Frequency Identification: a review of low cost tag security proposals}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {391--399}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015500}, doi = {10.1504/IJICS.2007.015500}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Bolan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChangC07, author = {Ya{-}Fen Chang and Chin{-}Chen Chang}, title = {An RSA-based (t, n) threshold proxy signature scheme with freewill identities}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {201--209}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012250}, doi = {10.1504/IJICS.2007.012250}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ChangC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DamianiBP07, author = {Maria Luisa Damiani and Elisa Bertino and Paolo Perlasca}, title = {Data security in location-aware applications: an approach based on {RBAC}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {5--38}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012243}, doi = {10.1504/IJICS.2007.012243}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DamianiBP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DuLW07, author = {Timon C. Du and Eldon Y. Li and Jacqueline W. Wong}, title = {Document access control in organisational workflows}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {437--454}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015504}, doi = {10.1504/IJICS.2007.015504}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DuLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HelmerWSHMWWS07, author = {Guy G. Helmer and Johnny Wong and Mark Slagell and Vasant G. Honavar and Les Miller and Yanxin Wang and Xia Wang and Natalia Stakhanova}, title = {Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {109--142}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012246}, doi = {10.1504/IJICS.2007.012246}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HelmerWSHMWWS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Hutchinson07, author = {William Hutchinson}, title = {An information-centric and proactive approach to Information Security teaching}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {369--377}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015498}, doi = {10.1504/IJICS.2007.015498}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Hutchinson07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/IndrakantiVA07, author = {Sarath Indrakanti and Vijay Varadharajan and Ritesh Agarwal}, title = {On the design, implementation and application of an authorisation architecture for web services}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {64--108}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012245}, doi = {10.1504/IJICS.2007.012245}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/IndrakantiVA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JansenGS07, author = {Wayne A. Jansen and Serban I. Gavrila and Cl{\'{e}}ment S{\'{e}}veillac}, title = {Smart Cards for mobile devices}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {400--413}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015501}, doi = {10.1504/IJICS.2007.015501}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JansenGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JohnsonS07, author = {Robert Johnson and Jessica Staddon}, title = {Deflation-secure web metering}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {39--63}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012244}, doi = {10.1504/IJICS.2007.012244}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JohnsonS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Kondakci07, author = {Suleyman Kondakci}, title = {A new assessment and improvement model of risk propagation in information security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {341--366}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013959}, doi = {10.1504/IJICS.2007.013959}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Kondakci07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LuiHY07, author = {Richard W. C. Lui and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Accountability in organisations}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {237--255}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013954}, doi = {10.1504/IJICS.2007.013954}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LuiHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PirzadaM07, author = {Asad Amir Pirzada and Chris McDonald}, title = {Collaborative Dynamic Source Routing using transitional trust filters}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {278--297}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013956}, doi = {10.1504/IJICS.2007.013956}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PirzadaM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PyeW07, author = {Graeme Pye and Matthew J. Warren}, title = {E-business security benchmarking: a model and framework}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {378--390}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015499}, doi = {10.1504/IJICS.2007.015499}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PyeW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/StakhanovaBW07, author = {Natalia Stakhanova and Samik Basu and Johnny Wong}, title = {A taxonomy of intrusion response systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {169--184}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012248}, doi = {10.1504/IJICS.2007.012248}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/StakhanovaBW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Valli07, author = {Craig Valli}, title = {Honeypot technologies and their applicability as a strategic internal countermeasure}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {430--436}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015503}, doi = {10.1504/IJICS.2007.015503}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Valli07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Wang0L07, author = {Alex Hai Wang and Peng Liu and Lunquan Li}, title = {Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {315--340}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013958}, doi = {10.1504/IJICS.2007.013958}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Wang0L07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangSM07, author = {Chiou{-}Pirng Wang and Don Snyder and Kathaleena Monds}, title = {A conceptual framework for curbing the epidemic of information malice: e-hygiene model with a human-factor approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {455--465}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015505}, doi = {10.1504/IJICS.2007.015505}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Williams07, author = {Patricia A. H. Williams}, title = {Medical data security: Are you informed or afraid?}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {414--429}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015502}, doi = {10.1504/IJICS.2007.015502}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Williams07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YangY07, author = {Lili Yang and Shuang{-}Hua Yang}, title = {A framework of security and safety checking for internet-based control systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {185--200}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012249}, doi = {10.1504/IJICS.2007.012249}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YangY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YuSG07, author = {Zhen Yu and William Sears and Yong Guan}, title = {PeerCredential: a reputation-based trust framework for Peer-to-Peer applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {256--277}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013955}, doi = {10.1504/IJICS.2007.013955}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YuSG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.