


default search action
Information Security Technical Report, Volume 6
Volume 6, Number 1, March 2001
- Chez Ciechanowicz:

Introduction. 1 - Perry B. Gentry:

What is a VPN? 15-22 - J. Stuart Broderick:

Implementing Virtual Private Networks in Today's Organization. 23-30 - J. Stuart Broderick:

VPN Security Policy. 31-34 - Neil Dunbar:

IPsec Networking Standards - An Overview. 35-48 - Samantha Donovan, Peter Drabwell, Rae Harbird:

VPNs and Lightweight Clients. 49-64 - William Box, Keith Sterling:

Enabling the User: The VPN in Context. 65-76 - Georgina Schäfer:

Placement of Intelligence Within Networks to Provide Corporate VPN Services. 77-94
Volume 6, Number 2, June 2001
- Chez Ciechanowicz:

Introduction. 1 - Paul J. G. Lothian, Peter Wenham:

Database Security in a Web Environment. 12-20 - Carlo Bellettini

, Elisa Bertino, Elena Ferrari
:
Role Based Access Control Models. 21-29 - Simon R. Wiseman:

Database Security: Retrospective and Way Forward. 30-43 - Elisa Bertino, Barbara Carminati

, Elena Ferrari
:
XML security. 44-58 - Vijay Atluri

:
Security for Workflow Systems. 59-68 - Sushil Jajodia, Duminda Wijesekera:

Security in Federated Database Systems. 69-79 - Mary Ann Davidson:

Security for eBusiness. 80-94 - Bhavani Thuraisingham:

Security for Distributed Databases. 95-102
Volume 6, Number 3, September 2001
- Chez Ciechanowicz:

Introduction. 1 - J. Stuart Broderick:

Information Security Risk Management - When Should It be Managed? 12-18 - Jonathan Tregear:

Risk Assessment. 19-27 - Lech J. Janczewski:

Handling Distributed Denial-of-Service Attacks. 37-44 - Rob Dodson:

Information Incident Management. 45-53 - David Teneyuca:

Organizational Leader's Use Of Risk Management for Information Technology. 54-59 - Paul Williams:

Information Security Governance. 60-70
Volume 6, Number 4, December 2001
- Chez Ciechanowicz:

Introduction. 1 - Andy Nikishin:

Red Alert. 12-17 - Igor Muttik:

Pick'n'mix comparative tests. 18-30 - Sami Rautiainen:

Travelling with Linux malware: Is Linux security for real? 58-64 - Katrin Tocheva:

Worm's Fashion Salon. 65-78 - Sarah Gordon:

The Virus Writer and The Reporter. 79-82

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














