nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access control for XML documents and data
|
Bertino, Elisa |
|
2004 |
|
3 |
p. 19-34 16 p. |
artikel |
2 |
Achieving information resiliency
|
Zavidniak, Paul |
|
1999 |
|
3 |
p. 54-62 9 p. |
artikel |
3 |
A comparison between traditional public key infrastructures and identity-based cryptography
|
Paterson, Kenneth G |
|
2003 |
|
3 |
p. 57-72 16 p. |
artikel |
4 |
Adding security labelling to Windows NT
|
Wiseman, Simon |
|
1998 |
|
3 |
p. 44-52 9 p. |
artikel |
5 |
Addressing Online Identity: Understanding the Microsoft Passport Service
|
|
|
2002 |
|
3 |
p. 65-80 16 p. |
artikel |
6 |
A lightweight framework for secure life-logging in smart environments
|
Petroulakis, Nikolaos E. |
|
2013 |
|
3 |
p. 58-70 |
artikel |
7 |
A mobile device management framework for secure service delivery
|
Leung, Adrian |
|
2008 |
|
3 |
p. 118-126 |
artikel |
8 |
An effective multi-layered defense framework against spam
|
Zhou, Jianying |
|
2007 |
|
3 |
p. 179-185 |
artikel |
9 |
An overview of network evasion methods
|
Hernacki, Brian |
|
2005 |
|
3 |
p. 140-149 10 p. |
artikel |
10 |
Assessing insider threats to information security using technical, behavioural and organisational measures
|
Roy Sarkar, Kuheli |
|
2010 |
|
3 |
p. 112-133 |
artikel |
11 |
Authentication & key agreement for off-portal mobile applications
|
MacDonald, John A. |
|
2008 |
|
3 |
p. 127-135 |
artikel |
12 |
A vendor's view
|
Greenland, John |
|
1996 |
|
3 |
p. 29-32 4 p. |
artikel |
13 |
Beyond boundary protection devices — The concept of recovery
|
Nash, Colin L. |
|
1999 |
|
3 |
p. 20-27 8 p. |
artikel |
14 |
Biometrics
|
Bernecker, Otto |
|
2006 |
|
3 |
p. 111-118 |
artikel |
15 |
Botnets: To what extent are they a threat to information security?
|
Elliott, Claire |
|
2010 |
|
3 |
p. 79-103 |
artikel |
16 |
Certificate policies and certification practice statements — a practical approach
|
|
|
2003 |
|
3 |
p. 14-22 9 p. |
artikel |
17 |
Commercial use of cryptography in the shell companies
|
Mansfield, Nick |
|
1997 |
|
3 |
p. 18-20 3 p. |
artikel |
18 |
Computer crime – A 2011 update
|
Austen, John |
|
2010 |
|
3 |
p. 77-78 |
artikel |
19 |
Coordinated decision making in distributed applications
|
Chadwick, David |
|
2007 |
|
3 |
p. 147-154 |
artikel |
20 |
Could there ever be a unitary digital certificate?
|
Jaweed, Semia |
|
2003 |
|
3 |
p. 36-44 9 p. |
artikel |
21 |
Cryptography from Pairings: A Snapshot of Current Research
|
|
|
2002 |
|
3 |
p. 41-54 14 p. |
artikel |
22 |
Daonity – Grid security from two levels of virtualization
|
Chen, Haibo |
|
2007 |
|
3 |
p. 123-138 |
artikel |
23 |
Data mining and machine learning—Towards reducing false positives in intrusion detection
|
Pietraszek, Tadeusz |
|
2005 |
|
3 |
p. 169-183 15 p. |
artikel |
24 |
Defensive information warfare
|
Millar, Bill |
|
1999 |
|
3 |
p. 63-69 7 p. |
artikel |
25 |
Delegated Certificate Validation:
|
|
|
2003 |
|
3 |
p. 45-52 8 p. |
artikel |
26 |
Developing a Windows NT security policy
|
White, Ian |
|
1998 |
|
3 |
p. 31-43 13 p. |
artikel |
27 |
Developments in mobile communications security
|
Tomlinson, Allan |
|
2008 |
|
3 |
p. 111 |
artikel |
28 |
Dissecting application security XML schemas
|
Michalek, Peter |
|
2004 |
|
3 |
p. 66-76 11 p. |
artikel |
29 |
Distributed security services in microsoft Windows NT 5.0 — Kerberos and the active directory
|
Pittaway, Glenn |
|
1998 |
|
3 |
p. 53-64 12 p. |
artikel |
30 |
Editorial
|
Tomlinson, A. |
|
2007 |
|
3 |
p. 111-112 |
artikel |
31 |
Embedded security in a pervasive world
|
Paar, Christof |
|
2007 |
|
3 |
p. 155-161 |
artikel |
32 |
Federated identity and web services
|
Madsen, Paul |
|
2004 |
|
3 |
p. 56-65 10 p. |
artikel |
33 |
Footprinting for intrusion detection and threat assessment
|
Blyth, Andrew |
|
1999 |
|
3 |
p. 43-53 11 p. |
artikel |
34 |
Future consumer mobile phone security: A case study using the data-centric security model
|
van Cleeff, André |
|
2008 |
|
3 |
p. 112-117 |
artikel |
35 |
Grid security: Next steps
|
Martin, Andrew |
|
2007 |
|
3 |
p. 113-122 |
artikel |
36 |
Handling Distributed Denial-of-Service Attacks
|
Janczewski, Lech J |
|
2001 |
|
3 |
p. 37-44 8 p. |
artikel |
37 |
High tech criminal threats to the national information infrastructure
|
Choo, Kim-Kwang Raymond |
|
2010 |
|
3 |
p. 104-111 |
artikel |
38 |
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems
|
Dell'Amico, Matteo |
|
2013 |
|
3 |
p. 81-92 |
artikel |
39 |
Identity and Authentication in the E-economy
|
|
|
2002 |
|
3 |
p. 12-19 8 p. |
artikel |
40 |
ID-PKC: a fresh approach to public key cryptography
|
|
|
2003 |
|
3 |
p. 53-56 4 p. |
artikel |
41 |
Improving the secure management of personal data: Privacy on-line IS important, but it's not easy
|
Hilton, Jeremy |
|
2009 |
|
3 |
p. 124-130 |
artikel |
42 |
Informational privacy, consent and the “control” of personal data
|
Whitley, Edgar A. |
|
2009 |
|
3 |
p. 154-159 |
artikel |
43 |
Information Incident Management
|
Dodson, Rob |
|
2001 |
|
3 |
p. 45-53 9 p. |
artikel |
44 |
Information Security Governance
|
Williams, Paul |
|
2001 |
|
3 |
p. 60-70 11 p. |
artikel |
45 |
Information Security Risk Management — When Should It be Managed?
|
Broderick, J.S. |
|
2001 |
|
3 |
p. 12-18 7 p. |
artikel |
46 |
Information Security Risks and Managed Security Service
|
Navarro, Luis |
|
2001 |
|
3 |
p. 28-36 9 p. |
artikel |
47 |
Information security standards for outsourcing
|
Pepper, Bill |
|
1996 |
|
3 |
p. 59-61 3 p. |
artikel |
48 |
Information warfare — what is it?
|
Jones, A. |
|
1999 |
|
3 |
p. 12-19 8 p. |
artikel |
49 |
Informing the decision process in an automated intrusion response system
|
Papadaki, M. |
|
2005 |
|
3 |
p. 150-161 12 p. |
artikel |
50 |
International CIP policy: Problems and prospects
|
Rathmell, Andrew |
|
1999 |
|
3 |
p. 28-42 15 p. |
artikel |
51 |
Introduction
|
|
|
2002 |
|
3 |
p. 1- 1 p. |
artikel |
52 |
Introduction
|
Piper, Fred |
|
2003 |
|
3 |
p. 5- 1 p. |
artikel |
53 |
Introduction
|
Hardy, Gary |
|
1997 |
|
3 |
p. 1- 1 p. |
artikel |
54 |
Introduction
|
Hardy, Gary |
|
1996 |
|
3 |
p. 1-2 2 p. |
artikel |
55 |
Introduction
|
Ciechanowicz, Chez |
|
2001 |
|
3 |
p. 1- 1 p. |
artikel |
56 |
Introduction
|
Ciechanowicz, Chez |
|
1998 |
|
3 |
p. 1-2 2 p. |
artikel |
57 |
Introduction
|
Ciechanowicz, Chez |
|
1999 |
|
3 |
p. 1- 1 p. |
artikel |
58 |
Introduction
|
Crampton, Jason |
|
2004 |
|
3 |
p. 5- 1 p. |
artikel |
59 |
Introduction – Intrusion detection and prevention
|
Ganley, Michael |
|
2005 |
|
3 |
p. 133- 1 p. |
artikel |
60 |
Introduction to XML Encryption and XML Signature
|
Lautenbach, Berin |
|
2004 |
|
3 |
p. 6-18 13 p. |
artikel |
61 |
Intrusion Detection Systems and Intrusion Prevention Systems
|
Fuchsberger, Andreas |
|
2005 |
|
3 |
p. 134-139 6 p. |
artikel |
62 |
Kerberos authentication in Windows NT 5.0 domains
|
Brundrett, Peter |
|
1998 |
|
3 |
p. 65-70 6 p. |
artikel |
63 |
Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android
|
Schreckling, Daniel |
|
2013 |
|
3 |
p. 71-80 |
artikel |
64 |
Mobile communication security controllers an evaluation paper
|
Mayes, Keith E. |
|
2008 |
|
3 |
p. 173-192 |
artikel |
65 |
Mobile telephony security compromises
|
Walker, William |
|
2010 |
|
3 |
p. 134-136 |
artikel |
66 |
Network security: Anything but bulletproof
|
Klaus, Christopher W. |
|
1997 |
|
3 |
p. 28-32 5 p. |
artikel |
67 |
New mutual agreement protocol to secure mobile RFID-enabled devices
|
Lo, N.W. |
|
2008 |
|
3 |
p. 151-157 |
artikel |
68 |
Next-generation intrusion prevention: Accounting for the attack timeline
|
Sourcefire, Inc., |
|
2005 |
|
3 |
p. 162-168 7 p. |
artikel |
69 |
Obtaining assurance about your security
|
Pepper, Bill |
|
1996 |
|
3 |
p. 38-47 10 p. |
artikel |
70 |
On handling insider attacks in wireless sensor networks
|
Krauß, Christoph |
|
2008 |
|
3 |
p. 165-172 |
artikel |
71 |
On the deployment of a real scalable delegation service
|
Lopez, Javier |
|
2007 |
|
3 |
p. 139-146 |
artikel |
72 |
On the potential of high density smart cards
|
Mayes, Keith E. |
|
2006 |
|
3 |
p. 147-153 |
artikel |
73 |
Organizational Leader’s Use Of Risk Management for Information Technology
|
Teneyuca, David |
|
2001 |
|
3 |
p. 54-59 6 p. |
artikel |
74 |
Outsourcing — A legal perspective on contract critical success factors
|
Honess, Sandra |
|
1996 |
|
3 |
p. 57-58 2 p. |
artikel |
75 |
Outsourcing — The major legal issues
|
|
|
1996 |
|
3 |
p. 51-56 6 p. |
artikel |
76 |
PKI needs good standards?
|
|
|
2003 |
|
3 |
p. 6-13 8 p. |
artikel |
77 |
Privacy and consent in pervasive networks
|
Malik, Nazir A. |
|
2009 |
|
3 |
p. 138-142 |
artikel |
78 |
Privacy and consent in the digital era
|
Elahi, Shirin |
|
2009 |
|
3 |
p. 113-118 |
artikel |
79 |
‘Privacy and public policy delivery – Dichotomy or design’
|
Churchill, Andrew |
|
2009 |
|
3 |
p. 131-137 |
artikel |
80 |
Reflections on privacy, identity and consent in on-line services
|
Bennett, Louise |
|
2009 |
|
3 |
p. 119-123 |
artikel |
81 |
Report Highlights
|
|
|
2002 |
|
3 |
p. 3-11 9 p. |
artikel |
82 |
Report highlights
|
|
|
1996 |
|
3 |
p. 3-7 5 p. |
artikel |
83 |
Report Highlights
|
|
|
2001 |
|
3 |
p. 3-11 9 p. |
artikel |
84 |
Report highlights
|
|
|
1999 |
|
3 |
p. 3-11 9 p. |
artikel |
85 |
Report highlights
|
|
|
1997 |
|
3 |
p. 2-7 6 p. |
artikel |
86 |
Report highlights
|
|
|
1998 |
|
3 |
p. 3-14 12 p. |
artikel |
87 |
Risk Assessment
|
Tregear, Jonathan |
|
2001 |
|
3 |
p. 19-27 9 p. |
artikel |
88 |
Secure Access Management: Trends, Drivers and Solutions
|
|
|
2002 |
|
3 |
p. 81-94 14 p. |
artikel |
89 |
Secure authenticated group key agreement protocol in the MANET environment
|
Yeun, Chan Yeob |
|
2008 |
|
3 |
p. 158-164 |
artikel |
90 |
Secure Authentication Using Biometric Methods
|
|
|
2002 |
|
3 |
p. 30-40 11 p. |
artikel |
91 |
Secure computations on non-integer values with applications to privacy-preserving sequence analysis
|
Franz, M. |
|
2013 |
|
3 |
p. 117-128 |
artikel |
92 |
Security and privacy for digital ecosystems
|
Askoxylakis, Ioannis G. |
|
2013 |
|
3 |
p. 45 |
artikel |
93 |
Security: An end user perspective
|
Schwiderski-Grosche, S. |
|
2006 |
|
3 |
p. 109-110 |
artikel |
94 |
Security considerations for broadcast systems
|
Wright, Tim |
|
2006 |
|
3 |
p. 137-146 |
artikel |
95 |
Security considerations in outsourcing IT services
|
Blackley, John A. |
|
1996 |
|
3 |
p. 11-17 7 p. |
artikel |
96 |
Security issues in today's corporate network
|
Sherwood, John |
|
1997 |
|
3 |
p. 8-17 10 p. |
artikel |
97 |
Security service level agreements for outsourced security functions
|
Pepper, Bill |
|
1996 |
|
3 |
p. 48-50 3 p. |
artikel |
98 |
Security standards: An end-user perspective
|
Berger, Brian |
|
2006 |
|
3 |
p. 129-136 |
artikel |
99 |
Server-aided signatures verification secure against collusion attack
|
Chow, Sherman S.M. |
|
2013 |
|
3 |
p. 46-57 |
artikel |
100 |
Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications
|
Christin, Delphine |
|
2013 |
|
3 |
p. 105-116 |
artikel |
101 |
Should TTPs be licensed?
|
Walker, John |
|
1997 |
|
3 |
p. 21-27 7 p. |
artikel |
102 |
Smart Cards and the Associated Infrastructure Problem
|
|
|
2002 |
|
3 |
p. 20-29 10 p. |
artikel |
103 |
SmartK: Smart cards in operating systems at kernel level
|
Catuogno, Luigi |
|
2013 |
|
3 |
p. 93-104 |
artikel |
104 |
Spontaneous mobile device authentication based on sensor data
|
Mayrhofer, Rene |
|
2008 |
|
3 |
p. 136-150 |
artikel |
105 |
Strategic security for IP networks
|
Ranum, Marcus J. |
|
1997 |
|
3 |
p. 46-52 7 p. |
artikel |
106 |
The changing shape of privacy and consent
|
Coles-Kemp, Lizzie |
|
2009 |
|
3 |
p. 111-112 |
artikel |
107 |
The complexity of DPA type side channel attacks and their dependency on the algorithm design
|
Ruedinger, Jens |
|
2006 |
|
3 |
p. 154-158 |
artikel |
108 |
The Development of Open, Federated Specifications for Network Identity
|
|
|
2002 |
|
3 |
p. 55-64 10 p. |
artikel |
109 |
The first practical guide to data security law and breach action!
|
|
|
2009 |
|
3 |
p. 173 |
artikel |
110 |
The need for enhanced privacy and consent dialogues
|
Bogdanovic, Danijela |
|
2009 |
|
3 |
p. 167-172 |
artikel |
111 |
The NHS as a proving ground for cryptosystems
|
Dalton, Chris R |
|
2003 |
|
3 |
p. 73-88 16 p. |
artikel |
112 |
The Open Digital Rights Language: XML for Digital Rights Management
|
Iannella, Renato |
|
2004 |
|
3 |
p. 47-55 9 p. |
artikel |
113 |
The relevance of penetration testing to corporate network security
|
Hardy, Gary |
|
1997 |
|
3 |
p. 80-86 7 p. |
artikel |
114 |
The risk of allowing outside staff access to your information systems
|
Peltier, Tom |
|
1996 |
|
3 |
p. 18-28 11 p. |
artikel |
115 |
The security challenges for mobile ubiquitous services
|
Leung, Adrian |
|
2007 |
|
3 |
p. 162-171 |
artikel |
116 |
Thinking about firewalls V2.0: Beyond perimeter security
|
Ranum, Marcus J |
|
1997 |
|
3 |
p. 33-45 13 p. |
artikel |
117 |
Trends in outsourcing
|
Pepper, Bill |
|
1996 |
|
3 |
p. 8-10 3 p. |
artikel |
118 |
tScheme — voluntary approval for certificate authority services
|
Emery, Dick |
|
2003 |
|
3 |
p. 23-35 13 p. |
artikel |
119 |
Ubiquitous security for ubiquitous computing
|
Hayat, Zia |
|
2007 |
|
3 |
p. 172-178 |
artikel |
120 |
Unix network security
|
McNamarra, Roy |
|
1997 |
|
3 |
p. 66-79 14 p. |
artikel |
121 |
Victorian values: Politicians and the public incorrectly see security and privacy as opposites
|
Birch, David G.W. |
|
2009 |
|
3 |
p. 143-145 |
artikel |
122 |
What's happened to PETs?
|
Wilton, Robin |
|
2009 |
|
3 |
p. 146-153 |
artikel |
123 |
What user-controlled identity management should learn from communities
|
Borcea-Pfitzmann, Katrin |
|
2006 |
|
3 |
p. 119-128 |
artikel |
124 |
Windows NT — Remote access
|
Hayday, John |
|
1998 |
|
3 |
p. 23-30 8 p. |
artikel |
125 |
Windows NT security
|
White, Ian |
|
1997 |
|
3 |
p. 53-65 13 p. |
artikel |
126 |
Windows NT security architecture
|
Hayday, John |
|
1998 |
|
3 |
p. 15-22 8 p. |
artikel |
127 |
XML-based access control languages
|
Ardagna, C.A. |
|
2004 |
|
3 |
p. 35-46 12 p. |
artikel |
128 |
You can outsource many activities but not fraud!
|
Iyer, Nigel K. |
|
1996 |
|
3 |
p. 33-37 5 p. |
artikel |
129 |
Young people, disclosure of personal information and online privacy: Control, choice and consequences
|
Bryce, Jo |
|
2009 |
|
3 |
p. 160-166 |
artikel |