


default search action
SEC 2001: Paris, France
- Michel Dupuy, Pierre Paradinas:

Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France. IFIP Conference Proceedings 193, Kluwer 2001, ISBN 0-7923-7389-8
eSociety
- Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos:

Pythia: Towards Anonymity in Authentication. SEC 2001: 1-18 - Kok Ming Ang, William J. Caelli:

Certificate Based PKI and B2B E-Commerce: Suitable Match or Not? SEC 2001: 19-34 - Claudia Eckert, A. Pircher:

Internet Anonymity: Problems and Solutions. SEC 2001: 35-50
TTP Management and PKI
- Albert Levi, Çetin Kaya Koç:

Reducing Certificate Revocating Cost using NPKI. SEC 2001: 51-60 - Bernd Blobel, Peter Pharow:

The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems. SEC 2001: 61-76
Smart Card
- Constantinos Markantonakis:

Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? SEC 2001: 77-92 - Jan Jürjens:

Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC. 93-108
Security Protocols
- Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:

Strong Forward Security. 109-122 - Annalisa De Bonis, Alfredo De Santis:

Secret Sharing and Visual Cryptography Schemes. SEC 2001: 123-138 - Alban Gabillon, Jungsoo Byun:

A Two-level Time-Stamping System. SEC 2001: 139-150 - Olivier Pereira, Jean-Jacques Quisquater:

Security Analysis of the Cliques Protocols Suites: First Results. SEC 2001: 151-166
Secure Workflow Environment
- Joon S. Park, Myong H. Kang, Judith N. Froscher:

A Secure Workflow System for Dynamic Collaboration. SEC 2001: 167-182 - T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker:

On Securely Scheduling a Meeting. SEC 2001: 183-198 - Konstantin Knorr, Henrik Stormer:

Modeling and Analyzing Separation of Duties in Workflow Environments. 199-212
Secure Group Communications
- Thomas Hardjono, Mark Baugher, Hugh Harney:

Group Security Association (GSA) Management in IP Multicast. SEC 2001: 213-228 - Yongdae Kim, Adrian Perrig, Gene Tsudik:

Communication-Efficient Group Key Agreement. SEC 2001: 229-244
Security Policies
- Amgad Fayad, Sushil Jajodia, Donald B. Faatz, Vinti Doshi:

Going Beyond MAC and DAC Using Mobile Policies. SEC 2001: 245-260 - Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:

An Access Control Model for Data Archives. SEC 2001: 261-276
Risk Management
- Sungbaek Cho, Zbigniew Ciechanowicz:

Checklist-Based Risk Analysis with Evidential Reasoning. SEC 2001: 277-292 - Ann Frisinger:

Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis. SEC 2001: 293-304 - Teemupekka Virtanen:

The Security Model to Combine the Corporate and Information Security. SEC 2001: 305-316 - Teemupekka Virtanen:

Design Criteria to Classified Information Systems Numerically. SEC 2001: 317-326
Network Security and Intrusion Detection
- Matthew J. Warren, William Hutchinson:

Deception: A Tool and Curse for Security Management. SEC 2001: 327-338 - Alexandr Seleznyov:

A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection. SEC 2001: 339-352 - Cédric Michel, Ludovic Mé:

ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection. SEC 2001: 353-368 - Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill:

Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. SEC 2001: 369-384
Trusted Platforms
- Antonio Mana, Ernesto Pimentel:

An Efficient Software Protection Scheme. SEC 2001: 385-402 - Adrian Spalka, Armin B. Cremers, Hanno Langweg:

Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs. SEC 2001: 403-420
Trusted System Design and Management
- Theodore Tryfonas, Evangelos A. Kiountouzis:

Security Concerns for Contemporary Development Practices: A Case Study. 421-436 - Mikko T. Siponen:

A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS. 437-452 - Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:

Redefining Information Systems Security: Viable Information Systems. SEC 2001: 453-468 - Guido Wimmel, Alexander K. Wißpeintner:

Extended Description Techniques for Security Engineering. 469-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














