Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 A fair Non-repudiation service in a web services peer-to-peer environment Agreiter, Berthold
2008
30 6 p. 372-378
7 p.
article
2 A general approach to securely querying XML Damiani, Ernesto
2008
30 6 p. 379-389
11 p.
article
3 A privacy aware and efficient security infrastructure for vehicular ad hoc networks Plößl, Klaus
2008
30 6 p. 390-397
8 p.
article
4 A proposal for extending the eduroam infrastructure with authorization mechanisms López, Gabriel
2008
30 6 p. 418-423
6 p.
article
5 A reputation system for electronic negotiations Tafreschi, Omid
2008
30 6 p. 351-360
10 p.
article
6 A three-layered model to implement data privacy policies Canfora, Gerardo
2008
30 6 p. 398-409
12 p.
article
7 Building a secure star schema in data warehouses by an extension of the relational package from CWM Soler, Emilio
2008
30 6 p. 341-350
10 p.
article
8 Editorial Board 2008
30 6 p. iii-
1 p.
article
9 Efficient key management for cryptographically enforced access control Zych, Anna
2008
30 6 p. 410-417
8 p.
article
10 Redesigning remote system administration paradigms for enhanced security and flexibility Prandini, Marco
2008
30 6 p. 424-432
9 p.
article
11 State of standards in the information systems security area Fernández-Medina, Eduardo
2008
30 6 p. 339-340
2 p.
article
12 Towards security requirements management for software product lines: A security domain requirements engineering process Mellado, Daniel
2008
30 6 p. 361-371
11 p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands