nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A framework for understanding and predicting insider attacks
|
Schultz, E.Eugene |
|
2002 |
21 |
6 |
p. 526-531 6 p. |
artikel |
2 |
Digest of recent IT security press coverage
|
|
|
2002 |
21 |
6 |
p. 532-536 5 p. |
artikel |
3 |
Events
|
|
|
2002 |
21 |
6 |
p. 537- 1 p. |
artikel |
4 |
From the editor-in-chief
|
|
|
2002 |
21 |
6 |
p. 478-480 3 p. |
artikel |
5 |
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm
|
Chen, Tzer-Shyong |
|
2002 |
21 |
6 |
p. 565-570 6 p. |
artikel |
6 |
IFIP technical committee 11
|
|
|
2002 |
21 |
6 |
p. 573-575 3 p. |
artikel |
7 |
in brief
|
|
|
2002 |
21 |
6 |
p. 532-536 5 p. |
artikel |
8 |
I-Worm.Lentin (aka Yaha)
|
Nikishin, Andy |
|
2002 |
21 |
6 |
p. 497-502 6 p. |
artikel |
9 |
Palladium, fraud, and surviving terrorism — Compsec 2002
|
Hilley, Sarah |
|
2002 |
21 |
6 |
p. 520-521 2 p. |
artikel |
10 |
Policy enforcement in the workplace
|
David, Jon |
|
2002 |
21 |
6 |
p. 506-513 8 p. |
artikel |
11 |
Principles and requirements for a secure e-voting system
|
Gritzalis, Dimitris A |
|
2002 |
21 |
6 |
p. 539-556 18 p. |
artikel |
12 |
Refereed papers
|
|
|
2002 |
21 |
6 |
p. 538- 1 p. |
artikel |
13 |
Security Views
|
Schultz, Eugene |
|
2002 |
21 |
6 |
p. 481-490 10 p. |
artikel |
14 |
The Blue Screen of Death and other deadly bugs
|
Hinde, Stephen |
|
2002 |
21 |
6 |
p. 491-496 6 p. |
artikel |
15 |
The US’s National Strategy for Homeland Security
|
Pounder, Chris |
|
2002 |
21 |
6 |
p. 503-505 3 p. |
artikel |
16 |
University systems security logging: who is doing it and how far can they go?
|
Rezmierski, Virginia E. |
|
2002 |
21 |
6 |
p. 557-564 8 p. |
artikel |
17 |
White collar crime: a handmaiden of international tech terrorism
|
Bequai, August |
|
2002 |
21 |
6 |
p. 514-519 6 p. |
artikel |