


default search action
SEC 2002: Cairo, Egypt
- Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba Kamal Aslan:

Security in the Information Society: Visions and Perspectives, IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt. IFIP Conference Proceedings 214, Kluwer 2002, ISBN 1-4020-7030-6
Information Security Management
- Oliver André Hoppe, Johan Van Niekerk, Rossouw von Solms:

The Effective Implementation of Information Security in Organizations. SEC 2002: 1-18 - Cheryl Vroom, Rossouw von Solms:

A Practical Approach to Information Security Awareness in the Organization. SEC 2002: 19-38 - David W. Chadwick, Alexander Otenko:

RBAC Policies in XML for X.509 Based Privilege Management. SEC 2002: 39-54 - Aftab Ahmad, Tobias Ruighaver:

A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration. SEC 2002: 55-66 - Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos:

Elaborating Quantitative Approaches for IT Security Evaluation. SEC 2002: 67-78
Standards of Information Security
- W. J. Brooks, Matthew J. Warren, William Hutchinson:

A Security Evaluation Criteria for Baseline Security Standards. SEC 2002: 79-90 - Mikko T. Siponen:

Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects. SEC 2002: 91-108
Threats and Attacks to Information
- A. Alayed, Steven Furnell, I. M. Barlow:

Addressing Internet Security Vulnerabilities: A Benchmarking Study. SEC 2002: 121-132 - John Haggerty, Qi Shi, Madjid Merabti:

The Threat From Within -An Analysis of Attacks on anInternal Network. SEC 2002: 133-146 - Simeon Xenitellis:

Security Vulnerabilities in Event-Driven Systems. SEC 2002: 147-160 - J. J. Yan:

Denial of Service: Another Example. SEC 2002: 161-170 - D. Salah, Heba Kamal Aslan, Mahmoud T. El-Hadidi:

A Detection Scheme for the SK Virus. SEC 2002: 171-182
Education and Curriculum for Information Security
- Teemupekka Virtanen, Ronja Addams-Moring:

An Information Security Curriculum in Finland. SEC 2002: 183-190
Social and Ethical Aspects of Information Security
- Thomas Schlienger, Stephanie Teufel:

Information Security Culture: The Socio-Cultural Dimension in Information Security Management. SEC 2002: 191-202 - A. Martins, Jan H. P. Eloff:

Information Security Culture. SEC 2002: 203-214
Information Security Services
- Paul Dowland, Steven Furnell, Maria Papadaki:

Keystroke Analysis as a Method of Advanced User Authentication and Response. SEC 2002: 215-226 - Magdy S. El-Soudani, H. S. El-Refaey, H. M. Mourad:

Zero Knowledge Broadcasting Identification Scheme. SEC 2002: 227-238 - Li-Sha He, Ning Zhang, Li-Rong He:

A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services. SEC 2002: 239-250 - Carla Merkle Westphall, Joni da Silva Fraga, Carlos Becker Westphall, S. C. S. Bianchi:

Mandatory Security Policies for CORBA Security Model. SEC 2002: 251-262 - Carla Merkle Westphall, Joni da Silva Fraga, Michelle S. Wangham, Rafael R. Obelheiro, Lau Cheuk Lung:

Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security. SEC 2002: 263-274 - Marijke Coetzee, Jan H. P. Eloff:

Secure Database Connectivity on the WWW. SEC 2002: 275-286 - Reinhardt A. Botha:

Towards Semantic Integrity in Rational Databases. SEC 2002: 287-298 - G. Osman, M. G. Darwish, Mohammed Zaki:

Formal Design of Packet Filtering Systems. SEC 2002: 299-310 - Elsayed Mohammed, A. Emarah, Kh. El-Shennawy:

Elliptic Curve Cryptosystems on Smart Cards. SEC 2002: 311-322
Multilateral Security
Applications of Information Security
- Christer Magnusson, Louise Yngström:

BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business. SEC 2002: 335-346 - Theodore Tryfonas, Evangelos A. Kiountouzis:

Information Systems Security and the Information Systems Development Project: Towards a Framework for Their Integration. SEC 2002: 347-356 - Riham Abdel-Moneim, Sherif El-Kassas, Hoda Hosny:

An Efficient Hybrid Sealed Bid Auction Protocol. SEC 2002: 357-372 - Simone Fischer-Hübner, Mikael Nilsson, Helena Lindskog:

Self-Determination in Mobile Internet: PiMI Prototype Results. SEC 2002: 373-386 - Simon N. Foley, Thomas B. Quillinan, John P. Morrison:

Secure Component Distribution Using WebCom. SEC 2002: 387-398 - Ryuya Uda, Masahito Ito, Kohei Awaya, Hiroshi Shigeno, Yutaka Matsushita:

E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals. SEC 2002: 399-410 - Delia Critchlow, Ning Zhang:

An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions. SEC 2002: 411-422
Infrastructure for Information Security
- Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia:

Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434
Advanced Topics in Security
- S. T. Faraj, F. Al-Naima, S. Y. Ameen:

Optical Network Models for Quantum Cryptography. SEC 2002: 435-452
Legislation for Information Security
- Panagiotes S. Anastasiades:

A Unified Regulatory Framework on a European Information Society: Suggested Building Levels. SEC 2002: 453-468 - Lilian Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas:

Revisiting Legal and Regulatory Requirements for Secure E-Voting. SEC 2002: 469-480
Modeling and Analysis for Information Security
- Meletis A. Belsis, Anthony N. Godwin, Leonid Smalov:

A Security Incident Data Model. SEC 2002: 481-494 - Arion Meier, Susanne Röhrig:

Security Levels for Contracting Agents. SEC 2002: 495-506 - Spyros Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou:

Functional Requirements for a Secure Electronic Voting System. SEC 2002: 507-520 - M. Hashem, A. Mohamed, M. Wahib:

Intelligent IP Packet Filtering. SEC 2002: 521-535
Tools for Information Security
- Mariki M. Eloff, Jan H. P. Eloff:

Human Computer Interaction: An Information Security Perspectives. SEC 2002: 535-546 - Jean-François Geneste:

A Very Smart Card for Fighting Against Terrorism. SEC 2002: 547-558 - Michael Meier, Niels Bischof, Thomas Holz:

SHEDEL-A Simple Hierarchical Event Description Language for Specifying Attack Signatures. SEC 2002: 559-572 - Kenneth P. Smith, Donald B. Faatz, Amgad Fayad, Sushil Jajodia:

Propagating Modifications to Mobile Policies. SEC 2002: 573-584

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














