-
1
-
-
0035575945
-
The PAPI system: Point of access to providers of information
-
Elsevier, Amsterdam
-
Castro-Rojo, R., Lopez, D. R.: The PAPI system: point of access to providers of information. In: Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 37. Elsevier, Amsterdam (2001) 703-710
-
(2001)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.37
, pp. 703-710
-
-
Castro-Rojo, R.1
Lopez, D.R.2
-
2
-
-
4243109556
-
A model for evaluating IT security investments
-
ACM Press, New York
-
Cavusoglu, H., Mishra, B., Raghunathan, S.: A Model for Evaluating IT Security Investments. In: Communications of the ACM, Volume 47. ACM Press, New York (2004) 87-92
-
(2004)
Communications of the ACM
, vol.47
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
5
-
-
33750083950
-
User centric identity management
-
Clark, A., Kerr, K., Mohay, G. (eds.): Gold Coast
-
Jøsang, A., Pope, S.: User Centric Identity Management. In: Clark, A., Kerr, K., Mohay, G. (eds.): Proceedings of AusCERT Asia Pacific Information Technology Security Conference 2005. Gold Coast (2005) 77-89
-
(2005)
Proceedings of AusCERT Asia Pacific Information Technology Security Conference 2005
, pp. 77-89
-
-
Jøsang, A.1
Pope, S.2
-
6
-
-
33646534622
-
Trust, privacy and security in e-business: Requirements and solutions
-
Proc. of the 10th Panhellenic Conference on Informatics (PCI'2005) Springer-Verlag, Berlin Heidelberg New York
-
Katsikas, S. K., Lopez, J., Pernul, G.: Trust, Privacy and Security in E-business: Requirements and Solutions. In: Proc. of the 10th Panhellenic Conference on Informatics (PCI'2005). Lecture Notes in Computer Science. Springer-Verlag, Berlin Heidelberg New York (2005) 548-558
-
(2005)
Lecture Notes in Computer Science
, pp. 548-558
-
-
Katsikas, S.K.1
Lopez, J.2
Pernul, G.3
-
7
-
-
0033719386
-
Risks of the passport single sign-on protocol
-
Elsevier, Amsterdam
-
Kormann, P., Rubin, A.: Risks of the Passport single sign-on protocol. In: Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 33. Elsevier, Amsterdam (2000) 51-58
-
(2000)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.33
, pp. 51-58
-
-
Kormann, P.1
Rubin, A.2
-
8
-
-
80052182531
-
-
Liberty Alliance Project
-
Liberty ID-FF Bindings and Profiles Specification, Liberty Alliance Project, 2003. Accessible at http://www.projectliberty.org/specs/liberty-idff- bindings-profiles-v1.2.pdf
-
(2003)
Liberty ID-FF Bindings and Profiles Specification
-
-
-
9
-
-
8344266879
-
Authentication and authorization infrastructures (AAIs): A comparative survey
-
Elsevier, Amsterdam
-
Lopez, J., Oppliger, R., Pernul, G.: Authentication and authorization infrastructures (AAIs): a comparative survey. In: Computers & Security, Volume 23. Elsevier, Amsterdam (2004) 578-590
-
(2004)
Computers & Security
, vol.23
, pp. 578-590
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
10
-
-
84941150906
-
-
Microsoft Passport Review Guide. Accessible at http://download.microsoft. com/download/a/f/4/af49b391-086e-4aa2-a84b-ef6d916b2f08/ passport_reviewguide. doc
-
Microsoft Passport Review Guide
-
-
-
11
-
-
33750955475
-
Ansätze zur evaluierung von sicherheitsinvestitionen
-
Proc. 2. Jahrestagung des GI-Fachbereichs Sicherheit, P-62, Köllen-Verlag, Bonn
-
Nowey, T., Federrath, H., Klein, C., Plössl, K.: Ansätze zur Evaluierung von Sicherheitsinvestitionen. In: Proc. 2. Jahrestagung des GI-Fachbereichs Sicherheit, Lecture Notes in Informatics, P-62, Köllen-Verlag, Bonn (2005) 15-26
-
(2005)
Lecture Notes in Informatics
, pp. 15-26
-
-
Nowey, T.1
Federrath, H.2
Klein, C.3
Plössl, K.4
-
12
-
-
0034271735
-
Risky business: What we have yet to learn about risk management
-
Elsevier, New York
-
Pfleeger, S.L.: Risky Business: what we have yet to learn about risk management. Journal of Systems and Software, Volume 53. Elsevier, New York (2000) 265-273
-
(2000)
Journal of Systems and Software
, vol.53
, pp. 265-273
-
-
Pfleeger, S.L.1
-
14
-
-
33750085639
-
A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce
-
IEEE Computer Society, Los Alamitos
-
Schlaeger, C., Nowey, T., Montenegro, J.A.: A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. In: Proc. of the First International Conference on Availability, Reliability and Security (ARES '06). IEEE Computer Society, Los Alamitos (2006) 709-716
-
(2006)
Proc. of the First International Conference on Availability, Reliability and Security (ARES '06)
, pp. 709-716
-
-
Schlaeger, C.1
Nowey, T.2
Montenegro, J.A.3
-
15
-
-
26844573387
-
Authentication and authorisation infrastructures in b2c e-commerce
-
Bauknecht, K., Pröll, B., Werthner, H. (eds.): Proc. of the Sixth International Conference on Electronic Commerce and Web Technologies - EC-Web '05. Springer Verlag, Berlin Heidelberg New York
-
Schlaeger, C., Pernul, G.: Authentication and Authorisation Infrastructures in b2c e-commerce. In: Bauknecht, K., Pröll, B., Werthner, H. (eds.): Proc. of the Sixth International Conference on Electronic Commerce and Web Technologies - EC-Web '05. Lecture Notes in Computer Science, Vol. 3590. Springer Verlag, Berlin Heidelberg New York (2005) 306-315
-
(2005)
Lecture Notes in Computer Science
, vol.3590
, pp. 306-315
-
-
Schlaeger, C.1
Pernul, G.2
-
17
-
-
33749642956
-
A critical discussion of risk and threat analysis methods and methodologies
-
University of Glamorgan
-
Vidalis, S.: A Critical Discussion of Risk and Threat Analysis Methods and Methodologies. School of Computing Technical Report CS-04-03, University of Glamorgan (2004)
-
(2004)
School of Computing Technical Report
, vol.CS-04-03
-
-
Vidalis, S.1
|