default search action
6. WOSIS 2008: Barcelona, Spain
- Alfonso Rodríguez, Mariemma Inmaculada Yagüe del Valle, Eduardo Fernández-Medina:
Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008. INSTICC Press 2008, ISBN 978-989-8111-44-9
Full Papers
- Ralph Herkenhöner:
Process Modeling for Privacy - Conformant Biobanking: Case Studies on Modeling in UMLsec. WOSIS 2008: 3-12 - Michele Chinosi, Alberto Trombetta:
Integrating Privacy Policies into Business Processes. WOSIS 2008: 13-25 - William M. Fitzgerald, Simon N. Foley, Mícheál Ó Foghlú:
Network Access Control Interoperation using Semantic Web Techniques. WOSIS 2008: 26-37 - Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT. WOSIS 2008: 38-48 - Cameron Ross Dunne, Thibault Candebat, David Gray:
An Access Control Model for Location based Services. WOSIS 2008: 49-58 - Pino Caballero-Gil, Amparo Fúster-Sabater, Maria Eugenia Pazo-Robles:
New Attack Strategy for the Shrinking Generator. WOSIS 2008: 59-67 - Sushmita Ruj, Bimal K. Roy:
Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes. WOSIS 2008: 68-77 - Joaquín Lasheras, Rafael Valencia-García, Jesualdo Tomás Fernández-Breis, José Ambrosio Toval Álvarez:
An Ontology-Based Framework for Modelling Security Requirements. WOSIS 2008: 78-88 - Michael VanHilst, Eduardo B. Fernández, Fabrício A. Braz:
A Multi-Dimensional Classification for Users of Security Patterns. WOSIS 2008: 89-98 - Qutaibah Althebyan, Brajendra Panda:
Knowledge Extraction and Management for Insider Threat Mitigation. WOSIS 2008: 99-110
Short Papers
- Heinz Lothar Grob, Gereon Strauch, Jan Hermans:
Conceptual Design of a Method to Support IS Security Investment Decisions within the Context of Critical Business Processes. WOSIS 2008: 113-121 - Marco Ramilli, Marco Prandini:
Adaptive Filtering of Comment Spam in Multi-user Forums and Blogs. WOSIS 2008: 122-132 - Min-Hua Shao, Shin-Jia Huang:
Trust-Aware Anonymous and Efficient Routing for Mobile Ad-Hoc Networks. WOSIS 2008: 132-137 - Sergio Pozo, Rafael Ceballos, Rafael M. Gasca:
Firewall Rule Set Inconsistency Characterization by Clustering. WOSIS 2008: 138-144 - Koen Buyens, Bart De Win, Wouter Joosen:
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. WOSIS 2008: 145-150 - Asmaa Adnane, Christophe Bidan, Rafael T. de Sousa Jr.:
Effectiveness of Trust Reasoning for Attack Detection in OLSR. WOSIS 2008: 151-157
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.