-
1
-
-
26544478445
-
Evaluating the cost of ownership for digital certificate projects
-
Aberdeen Group; Boston: Aberdeen Group
-
Aberdeen Group, 1998. Evaluating the Cost of Ownership for Digital Certificate Projects. Boston: Aberdeen Group.
-
(1998)
-
-
-
2
-
-
0003448413
-
UML in a nutshell
-
Cambridge: O'Reilly
-
Alhir, S. 1998. UML in a Nutshell. Cambridge: O'Reilly.
-
(1998)
-
-
Alhir, S.1
-
5
-
-
11244271401
-
The elliptic curve digital signature algorithm (ECDSA)
-
ANSI; X9.62 standard. Washington, DC: ANSI
-
ANSI, 1998. The Elliptic Curve Digital Signature Algorithm (ECDSA). X9.62 standard. Washington, DC: ANSI.
-
(1998)
-
-
-
7
-
-
85031156937
-
-
Internet X.509 Public Key Infrastructure Roadmap. PKIX Draft Standard. Reston: IETF
-
Aresenault, A. et al., 2002. Internet X.509 Public Key Infrastructure Roadmap. PKIX Draft Standard. Reston: IETF.
-
(2002)
-
-
Aresenault, A.1
-
8
-
-
85031150200
-
-
ASC X12; X12 Standard Release 4050. Washington, DC: ANSI
-
ASC X12, 2001. X12 Standard Release 4050. Washington, DC: ANSI.
-
(2001)
-
-
-
9
-
-
0038703578
-
Global E-commerce law
-
Baker & Mc Kenzie; Chicago: Baker & Mc Kenzie
-
Baker & Mc Kenzie, 2002. Global E-Commerce Law. http://www.bmck.com/ecommerce/intlegis-t.htm Chicago: Baker & Mc Kenzie.
-
(2002)
-
-
-
10
-
-
85031160630
-
-
Secure Computer Systems: Mathematical Foundations. ESD-TR-73-278. Washington, DC: MITRE Corp.
-
Bell, D., La Padulla, L. 1973. Secure Computer Systems: Mathematical Foundations. ESD-TR-73-278. Washington, DC: MITRE Corp.
-
(1973)
-
-
Bell, D.1
La Padulla, L.2
-
11
-
-
0038703577
-
Risk analysis - The security survey
-
Woburn: Butterworth - Heinemann
-
Broder, J.F. 2000. Risk Analysis - The Security Survey. Woburn: Butterworth - Heinemann.
-
(2000)
-
-
Broder, J.F.1
-
12
-
-
0009824933
-
Code of practice for information security management
-
BSI; British Standard 7799. London: British Standards Institute
-
BSI 1999, Code of practice for information security management. British Standard 7799. London: British Standards Institute.
-
(1999)
-
-
-
13
-
-
0025386404
-
Logic of authentication
-
Burrows, M., Abadi, M., Needham, R. 1990. Logic of Authentication. ACM Transactions on Comp. Systems, Vol. 8, No. 1, pp. 18 - 36.
-
(1990)
ACM Transactions on Comp. Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
15
-
-
85031154088
-
-
COBIT Steering Committee; Rolling Meadows: Information Systems Audit and Control Foundation
-
COBIT Steering Committee 1998. Executive Overview (2nd ed.). Rolling Meadows: Information Systems Audit and Control Foundation.
-
(1998)
Executive Overview (2nd Ed.)
-
-
-
16
-
-
0003735821
-
Standard for the format of arpa internet text messages
-
RFC 822. Reston: IETF
-
Crocker, D.H. 1982. Standard For The Format Of Arpa Internet Text Messages. RFC 822. Reston: IETF.
-
(1982)
-
-
Crocker, D.H.1
-
17
-
-
0036920866
-
Global trust, certification and (ISC)2
-
DeMaio, H. 2002. Global Trust, Certification and (ISC)2. Computers & Security Vol. 21. No. 8, pp. 701-704.
-
(2002)
Computers & Security
, vol.21
, Issue.8
, pp. 701-704
-
-
DeMaio, H.1
-
18
-
-
0032715216
-
Survival is not compulsory
-
Elsevier
-
Devargas M., 1999. Survival is Not Compulsory. Elsevier, Computers & Security, Vol. 18, No. 1, pp. 35-46.
-
(1999)
Computers & Security
, vol.18
, Issue.1
, pp. 35-46
-
-
Devargas, M.1
-
19
-
-
85031151016
-
Organization of marketing and marketing information system. Organization and information systems
-
Aedermannsdorf: Scitec Publications
-
Devetak, G. 1995. Organization of marketing and marketing information system. Organization and information systems. Aedermannsdorf: Scitec Publications.
-
(1995)
-
-
Devetak, G.1
-
20
-
-
27544515159
-
Electronic interaction in the workplace: Monitoring, retrieving and storing employee communications
-
Age. Publications and Seminars. New York: Morgan & Lewis Counselors
-
Dichter, M.S., Burkhardt, M.S. 2001. Electronic Interaction in the Workplace: Monitoring, Retrieving and Storing Employee Communications. Age. Publications and Seminars. New York: Morgan & Lewis Counselors. http://www.morganlewis.com/art61499.htm.
-
(2001)
-
-
Dichter, M.S.1
Burkhardt, M.S.2
-
21
-
-
33847753565
-
Transport layer security
-
Standard RFC 2246. Reston: IETF
-
Dierks, T., Allen, C. 1999. Transport Layer Security. Standard RFC 2246. Reston: IETF.
-
(1999)
-
-
Dierks, T.1
Allen, C.2
-
22
-
-
85031147761
-
Top 10 things to consider in developing an electronic commerce web site
-
Publications and Seminars. New York: Morgan & Lewis Counselors
-
Dreben, R.N., Werbach, J.L. 1999. Top 10 Things to Consider in Developing an Electronic Commerce Web Site. Publications and Seminars. New York: Morgan & Lewis Counselors. http://www.morganlewis.com/art8999.htm.
-
(1999)
-
-
Dreben, R.N.1
Werbach, J.L.2
-
23
-
-
1442357062
-
Secure hash algorithm - 1
-
RFC 3174 Standard. Reston: IETF
-
Eastlake, D., Jones, P. 2001, Secure Hash Algorithm - 1. RFC 3174 Standard. Reston: IETF.
-
(2001)
-
-
Eastlake, D.1
Jones, P.2
-
24
-
-
85031146183
-
Data protection directive
-
EU; Directive 1998/46/EC; Brussels: November: 1995
-
EU, 1998. Data Protection Directive. Directive 1998/46/EC Official Journal of the European Communities. Brussels: November: 1995.
-
(1998)
Official Journal of the European Communities
-
-
-
25
-
-
0037689249
-
Electronic signature directive
-
EU; Directive 1999/93/EC, Official Journal of the European Communities. Brussels: December 1999
-
EU, 1999. Electronic Signature Directive. Directive 1999/93/EC, Official Journal of the European Communities. Brussels: December 1999.
-
(1999)
-
-
-
26
-
-
84855627847
-
Directive on electronic commerce
-
EU; Directive 2000/31/EC, Official Journal of the European Communities. Brussels: June 2000
-
EU, 2000. Directive on Electronic Commerce. Directive 2000/31/EC, Official Journal of the European Communities. Brussels: June 2000.
-
(2000)
-
-
-
27
-
-
26544472850
-
Directive on privacy and electronic communications
-
EU; Directive 2002/58/EC, Official Journal of the European Communities. Brussels: July 2002
-
EU, 2001. Directive on Privacy and Electronic Communications. 2001. Directive 2002/58/EC, Official Journal of the European Communities. Brussels: July 2002.
-
(2001)
-
-
-
28
-
-
0003508558
-
Advanced encryption standard
-
Foti, J. (Ed.); FIPS Draft. Washington, DC: DoC
-
Foti, J. (Ed.) 2001. Advanced Encryption Standard. FIPS Draft. Washington, DC: DoC.
-
(2001)
-
-
-
29
-
-
0038027163
-
FIPA security SIG request for information
-
Foundation for Intelligent Physical Agents; F-OUT-00065 Deliverable. Concord: FIPA
-
Foundation for Intelligent Physical Agents (2001). FIPA Security SIG Request For Information. F-OUT-00065 Deliverable. Concord: FIPA.
-
(2001)
-
-
-
30
-
-
0008626109
-
Multipurpose internet mail extensions
-
RFC 2045 Standard. Reston: IETF
-
Freed, N. 1996. Multipurpose Internet Mail Extensions. RFC 2045 Standard. Reston: IETF.
-
(1996)
-
-
Freed, N.1
-
32
-
-
0038365280
-
From common criteria to elliptic curves - ISO/IEC JTC 1/SC 27, IT security techniques
-
Fumy, W., 2000. From Common Criteria to Elliptic Curves - ISO/IEC JTC 1/SC 27, IT Security Techniques. ISO Bulletin, No. 6, pp. 20-25.
-
(2000)
ISO Bulletin
, Issue.6
, pp. 20-25
-
-
Fumy, W.1
-
33
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
Los Alamitos: IEEE Press
-
Gong, L., Needham, R., Yahalom, R., 1990. Reasoning about Belief in Cryptographic Protocols. Proc. of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234-248 Los Alamitos: IEEE Press.
-
(1990)
Proc. of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
34
-
-
85031148040
-
-
Group on the Next Generation Internet Policy; e-Japan Initiative Tokyo: GNGIP
-
Group on the Next Generation Internet Policy, 2000. e-Japan Initiative Tokyo: GNGIP.
-
(2000)
-
-
-
35
-
-
0036684150
-
PKI: It's not dead, just resting
-
Gutmann, P., 2002. PKI: It's Not Dead, Just Resting. IEEE Computer, Vol. 35, No. 8, pp. 41-49.
-
(2002)
IEEE Computer
, vol.35
, Issue.8
, pp. 41-49
-
-
Gutmann, P.1
-
36
-
-
0038027166
-
Developing E-business systems and architectures
-
San Francisco: Morgan Kaufman
-
Harmon, P., 2001. Developing E-Business Systems and Architectures. San Francisco: Morgan Kaufman.
-
(2001)
-
-
Harmon, P.1
-
37
-
-
0003724870
-
Smart card security and application
-
London: Artech House
-
Hendry, M., 1997. Smart Card Security and Application. London: Artech House.
-
(1997)
-
-
Hendry, M.1
-
38
-
-
0003406298
-
Design and validation of computer protocols
-
London: Prentice Hall
-
Holzmann, J.G., 1991. Design and validation of computer protocols. London: Prentice Hall.
-
(1991)
-
-
Holzmann, J.G.1
-
39
-
-
0036918639
-
Policy challenges in building dependability in global infrastructures
-
Hunker, J., 2002. Policy challenges in building dependability in global infrastructures. Elsevier Science, Computers & Security, Vol. 21, No. 8, pp. 705-710.
-
(2002)
Elsevier Science, Computers & Security
, vol.21
, Issue.8
, pp. 705-710
-
-
Hunker, J.1
-
40
-
-
85031157765
-
-
ISO; IT - Identification Cards. IS 7816 / 1thru 10. Geneva: ISO
-
ISO, 1994. IT - Identification Cards. IS 7816 / 1thru 10. Geneva: ISO.
-
(1994)
-
-
-
41
-
-
85031152875
-
-
ISO; IT, OSI: Security Frameworks in Open Systems. IS 10181 / 1 thru 7. Geneva: ISO
-
ISO, 1995a. IT, OSI: Security Frameworks in Open Systems. IS 10181 / 1 thru 7. Geneva: ISO.
-
(1995)
-
-
-
42
-
-
85031159487
-
-
ISO; Quality Systems. Standards ISO 9001 thru 9003. Geneva: ISO
-
ISO, 1995b. Quality Systems. Standards ISO 9001 thru 9003. Geneva: ISO.
-
(1995)
-
-
-
43
-
-
0038703566
-
Quality management and quality system elements
-
ISO; Standards ISO 9004 / 1 thru 2. Geneva: ISO
-
ISO, 1997. Quality Management and Quality System Elements. Standards ISO 9004 / 1 thru 2. Geneva: ISO.
-
(1997)
-
-
-
44
-
-
85031147881
-
Common criteria, security techniques - Evaluation criteria for IT security
-
ISO; IS 15408, parts 1 thru 3. Geneva: ISO
-
ISO, 1999. Common Criteria, Security techniques - Evaluation criteria for IT security. IS 15408, parts 1 thru 3. Geneva: ISO.
-
(1999)
-
-
-
45
-
-
85031154269
-
-
ISO; Code of practice for inf. sec. management. ISO 17799 Standard. Geneva: ISO
-
ISO, 2000. Code of practice for inf. sec. management. ISO 17799 Standard. Geneva: ISO.
-
(2000)
-
-
-
46
-
-
85031154159
-
-
ISO; Z formal specification notation. FDIS 13568. Geneva: ISO
-
ISO, 2002. Z formal specification notation. FDIS 13568. Geneva: ISO.
-
(2002)
-
-
-
47
-
-
85031158465
-
IT - Open systems interconnection - The directory: Overview of concepts, models and services
-
ITU-T; Recommendation X.500. Geneva: ISO
-
ITU-T, 1997c. IT - Open Systems Interconnection - The Directory: Overview of concepts, models and services. Recommendation X.500. Geneva: ISO.
-
(1997)
-
-
-
48
-
-
4244000104
-
Public-key and attribute certificate frameworks
-
ITU-T; X.509 Standard. Geneva: ISO
-
ITU-T, 2000. Public-key and attribute certificate frameworks. X.509 Standard. Geneva: ISO.
-
(2000)
-
-
-
49
-
-
0003482564
-
Information hiding techniques for steganography and digital watermarking
-
London: Artech House
-
Katzenbeisser, S., Petitcolas, F.A.P., 1999. Information hiding techniques for steganography and digital watermarking. London: Artech House.
-
(1999)
-
-
Katzenbeisser, S.1
Petitcolas, F.A.P.2
-
50
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
Kemmerer, R.A., Vigna, G., 2002. Intrusion Detection: A Brief History and Overview. IEEE Computer, Security & Privacy, Vol. 35, No. 5, pp. 27-30.
-
(2002)
IEEE Computer, Security & Privacy
, vol.35
, Issue.5
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
51
-
-
0004347791
-
Differential power analysis, white paper
-
San Francisco: Cryptography Research Inc.
-
Kocher, P., Jaffe, J., Jun, B., 2000. Differential Power Analysis, White paper. San Francisco: Cryptography Research Inc.
-
(2000)
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
52
-
-
4243719783
-
Crypto law survey
-
Koops, B.J., 2001. Crypto Law Survey. http://rechten.kub.nl/koops/cryptolaw.
-
(2001)
-
-
Koops, B.J.1
-
53
-
-
85031148055
-
Enabling XML security
-
New York: IBM
-
Mactaggart M., 2001. Enabling XML security. http://www-106.ibm.com/developerworks/xm. New York: IBM.
-
(2001)
-
-
Mactaggart, M.1
-
54
-
-
85031158004
-
-
Inoviranje, Koper: College of Management
-
Likar, B., 2001. Inoviranje, Koper: College of Management.
-
(2001)
-
-
Likar, B.1
-
55
-
-
0035395659
-
Facing the challenge of wireless security
-
Miller, S.K., 2001. Facing the Challenge of Wireless Security. IEEE Computer, Vol. 35, No. 7, pp. 16-18.
-
(2001)
IEEE Computer
, vol.35
, Issue.7
, pp. 16-18
-
-
Miller, S.K.1
-
56
-
-
0005456577
-
Guidelines for Cryptography Policy
-
OECD; Paris: OECD
-
OECD, 1997. Guidelines for Cryptography Policy. Paris: OECD.
-
(1997)
-
-
-
57
-
-
85031146732
-
Implementing the OECD "Privacy guidelines" In the electronic environment: Focus on the internet
-
OECD; Paris: OECD
-
OECD, 1998. Implementing The OECD "Privacy Guidelines" In The Electronic Environment: Focus On The Internet. Paris: OECD.
-
(1998)
-
-
-
59
-
-
84892780300
-
The internet legal guide: Everything you need to know when doing business online
-
New York: John Wiley & Sons
-
Powers, D.M. 2001. The Internet Legal Guide: Everything you need to know when doing business online. New York: John Wiley & Sons.
-
(2001)
-
-
Powers, D.M.1
-
60
-
-
84876166635
-
Sicherheitskonzepte fuer das Internet
-
Heidelberg: dpunkt-Verlag
-
Raepple, M., 2001. Sicherheitskonzepte fuer das Internet. Heidelberg: dpunkt-Verlag.
-
(2001)
-
-
Raepple, M.1
-
61
-
-
1842643238
-
S/MIME message specification
-
Standard RFC 2633. Reston: IETF
-
Ramsdell, B., 1999. S/MIME Message Specification. Standard RFC 2633. Reston: IETF.
-
(1999)
-
-
Ramsdell, B.1
-
62
-
-
85031146415
-
-
CA Requirements. PASSWORD Project R. 2.5 document. Cambridge: Cambridge University
-
Roe, M., 1993. CA Requirements. PASSWORD Project R. 2.5 document. Cambridge: Cambridge University.
-
(1993)
-
-
Roe, M.1
-
64
-
-
0003441355
-
Protecting mobile agents against malicious hosts
-
Mobile Agent Security, LNCS 1419. Heidelberg: Springer Verlag
-
Sander, T., Tschudin, C.F., 1998. Protecting Mobile Agents Against Malicious Hosts. Mobile Agent Security, LNCS 1419. Heidelberg: Springer Verlag.
-
(1998)
-
-
Sander, T.1
Tschudin, C.F.2
-
65
-
-
0003855464
-
Applied cryptography
-
New York: John Willey & Sons
-
Schneier, B., 1996. Applied Cryptography. New York: John Willey & Sons.
-
(1996)
-
-
Schneier, B.1
-
66
-
-
0003902428
-
Cryptography and network security
-
London: Prentice Hall
-
Stallings, W., 1999. Cryptography and Network Security. London: Prentice Hall.
-
(1999)
-
-
Stallings, W.1
-
68
-
-
0005915973
-
IP security document roadmap
-
RFC 2411. Reston: IETF
-
Thayer, R., et al., 1998. IP Security Document Roadmap. RFC 2411. Reston: IETF.
-
(1998)
-
-
Thayer, R.1
-
69
-
-
0035118271
-
Slovene smart card and IP based health-care information system infrastructure
-
Amsterdam: Elsevier
-
Trček, D. et al., 2001. Slovene smart card and IP based health-care information system infrastructure. International journal of medical informatics. Vol. 61 pp. 33-43. Amsterdam: Elsevier.
-
(2001)
International Journal of Medical Informatics
, vol.61
, pp. 33-43
-
-
Trček, D.1
-
70
-
-
0037689235
-
Electronic data interchange for administration, commerce and transport - Syntax rules
-
UN Economic Commission for Europe; ISO 9735. Geneva: ISO
-
UN Economic Commission for Europe. 1993. Electronic Data Interchange for Administration, Commerce and Transport - Syntax Rules. ISO 9735. Geneva: ISO.
-
(1993)
-
-
-
71
-
-
0038365269
-
Model law on electronic commerce
-
UNCITRAL; Vienna: UNCITRAL
-
UNCITRAL, 1996. Model Law on Electronic Commerce. http://www.uncitral.org/english/texts/elect-com/ecommerceindex.htm. Vienna: UNCITRAL.
-
(1996)
-
-
-
72
-
-
4243838611
-
Model law on digital signatures
-
UNCITRAL; Vienna: UNCITRAL
-
UNCITRAL, 2001. Model Law on Digital Signatures. http://www.uncitral.org/english/texts/elect-com/ecommerceindex.htm. Vienna: UNCITRAL.
-
(2001)
-
-
-
73
-
-
85031152065
-
-
US Congress; Digital Millennium Copyright Act. H.R. 2281, Public Law 105-304. Washington D.C.: January 1998
-
US Congress, 1998. Digital Millennium Copyright Act. H.R. 2281, Public Law 105-304. Washington D.C.: January 1998.
-
(1998)
-
-
-
74
-
-
0038365275
-
Primer on E-commerce and intellectual property issues
-
WIPO; Geneva: WIPO
-
WIPO, 2000. Primer On E-commerce And Intellectual Property Issues. Geneva: WIPO.
-
(2000)
-
-
-
75
-
-
0008579225
-
Managing information across the enterprise
-
New York: John Willey & Sons
-
Wysocki, R.K., DeMichiell, R.L., 1997. Managing Information Across the Enterprise. New York: John Willey & Sons.
-
(1997)
-
-
Wysocki, R.K.1
Demichiell, R.L.2
|