no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A fair Non-repudiation service in a web services peer-to-peer environment
|
Agreiter, Berthold |
|
2008 |
30 |
6 |
p. 372-378 7 p. |
article |
2 |
A general approach to securely querying XML
|
Damiani, Ernesto |
|
2008 |
30 |
6 |
p. 379-389 11 p. |
article |
3 |
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
|
Plößl, Klaus |
|
2008 |
30 |
6 |
p. 390-397 8 p. |
article |
4 |
A proposal for extending the eduroam infrastructure with authorization mechanisms
|
López, Gabriel |
|
2008 |
30 |
6 |
p. 418-423 6 p. |
article |
5 |
A reputation system for electronic negotiations
|
Tafreschi, Omid |
|
2008 |
30 |
6 |
p. 351-360 10 p. |
article |
6 |
A three-layered model to implement data privacy policies
|
Canfora, Gerardo |
|
2008 |
30 |
6 |
p. 398-409 12 p. |
article |
7 |
Building a secure star schema in data warehouses by an extension of the relational package from CWM
|
Soler, Emilio |
|
2008 |
30 |
6 |
p. 341-350 10 p. |
article |
8 |
Editorial Board
|
|
|
2008 |
30 |
6 |
p. iii- 1 p. |
article |
9 |
Efficient key management for cryptographically enforced access control
|
Zych, Anna |
|
2008 |
30 |
6 |
p. 410-417 8 p. |
article |
10 |
Redesigning remote system administration paradigms for enhanced security and flexibility
|
Prandini, Marco |
|
2008 |
30 |
6 |
p. 424-432 9 p. |
article |
11 |
State of standards in the information systems security area
|
Fernández-Medina, Eduardo |
|
2008 |
30 |
6 |
p. 339-340 2 p. |
article |
12 |
Towards security requirements management for software product lines: A security domain requirements engineering process
|
Mellado, Daniel |
|
2008 |
30 |
6 |
p. 361-371 11 p. |
article |