-
1
-
-
0012208471
-
Finally, a Real Return on Security Spending
-
Feb
-
Berinato, S. (2002). Finally, a Real Return on Security Spending. CIO Magazin, Feb. 2002.
-
(2002)
CIO Magazin
-
-
Berinato, S.1
-
3
-
-
0035575945
-
The PAPI system: Point of access to providers of information
-
Castro-Rojo, R. and López, D. R. (2001). The PAPI system: point of access to providers of information. Computer Networks, 37(6) 703-710.
-
(2001)
Computer Networks
, vol.37
, Issue.6
, pp. 703-710
-
-
Castro-Rojo, R.1
López, D.R.2
-
4
-
-
4243109556
-
A model for evaluating IT security investments
-
Cavusoglu, H., Mishra, B. and Raghunathan, S. (2004). A model for evaluating IT security investments. Communications of the ACM, 47(7) 87-92.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
6
-
-
26844534244
-
Privacy Enhanced Technologies: Methods, Markets, Misuse
-
Proc. of the International Conference on Trust, Privacy & Security in Digital Business TrustBus '05, Copenhagen, Denmark, Springer
-
Federrath, H. (2005). Privacy Enhanced Technologies: Methods, Markets, Misuse. Proc. of the International Conference on Trust, Privacy & Security in Digital Business (TrustBus '05), Lecture Notes in Computer Science (LNCS), Vol. 3592, Copenhagen, Denmark, Springer.
-
(2005)
Lecture Notes in Computer Science (LNCS
, vol.3592
-
-
Federrath, H.1
-
7
-
-
38949183642
-
Anonyme und unbeobachtbare Kommunikaton im Internet
-
Jahrestagung der Gesellschaft für Informatik e.v, Dortmund, GI
-
Federrath, H., Köpseli, S. and Langos, H. (2002). Anonyme und unbeobachtbare Kommunikaton im Internet. Proc. of the 32. Jahrestagung der Gesellschaft für Informatik e.v., LNI 19, Dortmund, GI.
-
(2002)
Proc. of the 32
, vol.LNI 19
-
-
Federrath, H.1
Köpseli, S.2
Langos, H.3
-
8
-
-
38949194207
-
-
Feigenbaum, J. (1998). Towards an Infrastructure for Authorization -Position Paper. Proc. of the 3rd USENIX Workshop on Electronic Commerce - Invited Talks Supplement, Boston, Massachusetts, USA, USENIX.
-
Feigenbaum, J. (1998). Towards an Infrastructure for Authorization -Position Paper. Proc. of the 3rd USENIX Workshop on Electronic Commerce - Invited Talks Supplement, Boston, Massachusetts, USA, USENIX.
-
-
-
-
9
-
-
84969498792
-
The Conceptualization of Trust, Risk and Their Relationship in Electronic Commerce: The Need for Clarifications
-
Kohala Coast, HI, USA, IEEE
-
Gefen, D., Rao, V. S. and Tractinsky, N. (2003). The Conceptualization of Trust, Risk and Their Relationship in Electronic Commerce: The Need for Clarifications. Proc. of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03), Kohala Coast, HI, USA, IEEE.
-
(2003)
Proc. of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03)
-
-
Gefen, D.1
Rao, V.S.2
Tractinsky, N.3
-
11
-
-
38949105845
-
-
Kilger, M., Arkin, O. and Stutzman, a. J. (2004) In Know Your Enemy: Learning about Security Threats(Ed, Project, T. H.) Addison-Wesley Professional, pp. 505-556.
-
Kilger, M., Arkin, O. and Stutzman, a. J. (2004) In Know Your Enemy: Learning about Security Threats(Ed, Project, T. H.) Addison-Wesley Professional, pp. 505-556.
-
-
-
-
12
-
-
38949161871
-
-
Liberty Alliance (2004a). Liberty ID-FF Bindings and Profiles Specification. Accesible at http://www.projectliberty.org/liberty/content/ download/319/2369/file/draft-liberty-idff-bindings-profiles-1.2-errata-v2.0.pdf.
-
Liberty Alliance (2004a). Liberty ID-FF Bindings and Profiles Specification. Accesible at http://www.projectliberty.org/liberty/content/ download/319/2369/file/draft-liberty-idff-bindings-profiles-1.2-errata-v2.0.pdf.
-
-
-
-
13
-
-
38949083156
-
-
Liberty Alliance (2004b). Liberty ID-FF Protocols Schema Specification. Accesible at http://www.projectliberty.org/liberty/content/ download/2197/14625/file/draft-liberty-idff-protocols-schema1.2-errata-v3-0.pdf.
-
Liberty Alliance (2004b). Liberty ID-FF Protocols Schema Specification. Accesible at http://www.projectliberty.org/liberty/content/ download/2197/14625/file/draft-liberty-idff-protocols-schema1.2-errata-v3-0.pdf.
-
-
-
-
14
-
-
8344266879
-
Authentication and authorization infrastructures (AAIs): A comparative survey
-
Lopez, J., Oppliger, R. and Pernul, G. (2004). Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security, 23(7) 578-590.
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 578-590
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
15
-
-
0034966126
-
Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model
-
Kohala Coast, HI, USA, IEEE
-
McKnight, D. H. and Chervany, N. L. (2001). Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model. Proc. of the 34th Annual Hawaii International Conference on System Sciences ( HICSS'01), Kohala Coast, HI, USA, IEEE.
-
(2001)
Proc. of the 34th Annual Hawaii International Conference on System Sciences ( HICSS'01)
-
-
McKnight, D.H.1
Chervany, N.L.2
-
16
-
-
11844303949
-
-
Microsoft Inc, Accesible at
-
Microsoft Inc. (2003). Microsoft Passport Review Guide. Accesible at http://download.microsoft.com/download/a/f/4/af49b391-086e-4aa2-a84b- ef6d916b2f08/passport_reviewguide.doc.
-
(2003)
Microsoft Passport Review Guide
-
-
-
18
-
-
38949205576
-
-
Nowey, T., Federrath, H., Klein, C. and Plößl, K. (2005). Ansätze zur Evaluierung von Sicherheitsinvestitionen. Proc. of the Annual Sicherheit Conference 2005, Lecture Notes in Informatics, Regensburg, Germany, GI.
-
Nowey, T., Federrath, H., Klein, C. and Plößl, K. (2005). Ansätze zur Evaluierung von Sicherheitsinvestitionen. Proc. of the Annual "Sicherheit" Conference 2005, Lecture Notes in Informatics, Regensburg, Germany, GI.
-
-
-
-
19
-
-
33745883651
-
-
OASIS eXtensible Access Control Markup Language Technical Committee, Accesible at
-
OASIS eXtensible Access Control Markup Language Technical Committee eXtensible Access Control Markup Language (XACML). Accesible at http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml.
-
eXtensible Access Control Markup Language (XACML)
-
-
-
20
-
-
33646149431
-
-
OASIS Security Services Technical Committee, Accesible at
-
OASIS Security Services Technical Committee Security Assertion Markup Language (SAML). Accesible at http://www.oasis-open.org/committees/tc_home. php?wg_abbrev=security.
-
Security Assertion Markup Language (SAML)
-
-
-
22
-
-
0004198635
-
-
Upper Saddle River, NJ, USA, Prentice Hall PTR
-
Pfleeger, C. P. and Pfleeger, S. L. (2003). Security in computing. Upper Saddle River, NJ, USA, Prentice Hall PTR.
-
(2003)
Security in computing
-
-
Pfleeger, C.P.1
Pfleeger, S.L.2
-
23
-
-
0034271735
-
Risky business: What we have yet to learn about risk management
-
Pfleeger, S. L. (2000). Risky business: what we have yet to learn about risk management. Journal of Systems and Software, 53(3) 265-273.
-
(2000)
Journal of Systems and Software
, vol.53
, Issue.3
, pp. 265-273
-
-
Pfleeger, S.L.1
-
24
-
-
38949202991
-
Risk Management for Software Development
-
Rook, P. (1993). Risk Management for Software Development. ESCOM Tutorial, 24.
-
(1993)
ESCOM Tutorial
, vol.24
-
-
Rook, P.1
-
25
-
-
34548191570
-
Effects of Architectural Decisions in Authentication and Authorisation Infrastructures
-
Vienna, Austria, IEEE
-
Schläger, C. and Ganslmayer, M. (2007). Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. Proc. of the 2nd International Conference on Availability, Reliability and Security (ARES'07), Vienna, Austria, IEEE.
-
(2007)
Proc. of the 2nd International Conference on Availability, Reliability and Security (ARES'07)
-
-
Schläger, C.1
Ganslmayer, M.2
-
26
-
-
33750036384
-
Towards a Risk Management Perspective on AAIs
-
Proc. of the International Conference on Trust, Privacy & Security in Digital Business TrustBus '06, Krakow, Poland, Springer
-
Schläger, C. and Nowey, T. (2006). Towards a Risk Management Perspective on AAIs. Proc. of the International Conference on Trust, Privacy & Security in Digital Business (TrustBus '06), Lecture Notes in Computer Science (LNCS), Vol. 4083, Krakow, Poland, Springer.
-
(2006)
Lecture Notes in Computer Science (LNCS
, vol.4083
-
-
Schläger, C.1
Nowey, T.2
-
27
-
-
33750085639
-
A reference model for Authentication and Authorisation Infrastructures respecting privacy and flexibility in b2c E-Commerce
-
Vienna, Austria, Vienna, Austria, IEEE
-
Schläger, C., Nowey, T. and Montenegro, J. A. (2006). A reference model for Authentication and Authorisation Infrastructures respecting privacy and flexibility in b2c E-Commerce. Proc. of the 1st International Conference on Availability, Reliability and Security (ARES 2006), Vienna, Austria, Vienna, Austria, IEEE.
-
(2006)
Proc. of the 1st International Conference on Availability, Reliability and Security (ARES
-
-
Schläger, C.1
Nowey, T.2
Montenegro, J.A.3
-
28
-
-
26844573387
-
-
Schläger, C. and Pernul, G. (2005). Authentication and Authorisation Infrastructures in b2c E-Commerce. Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web'05), Copenhagen, Denmark, Lecture Notes in Computer Science (LNCS), 3590, Copenhagen, Denmark, Springer.
-
Schläger, C. and Pernul, G. (2005). Authentication and Authorisation Infrastructures in b2c E-Commerce. Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web'05), Copenhagen, Denmark, Lecture Notes in Computer Science (LNCS), Vol. 3590, Copenhagen, Denmark, Springer.
-
-
-
-
29
-
-
33750066953
-
Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers
-
Proc. of the International Conference on E-Commerce and Web Technologies EC-Web'06, Krakow, Poland, Krakow, Poland, Springer
-
Schläger, C., Sojer, M., Muschall, B. and Pernul, G. (2006). Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web'06), Krakow, Poland, Lecture Notes in Computer Science (LNCS), Vol. 4082, Krakow, Poland, Springer.
-
(2006)
Lecture Notes in Computer Science (LNCS
, vol.4082
-
-
Schläger, C.1
Sojer, M.2
Muschall, B.3
Pernul, G.4
-
30
-
-
0003520264
-
-
Upper Saddle River, N.J, USA, Prentice Hall
-
Tanenbaum, A. S. and Steen, M. v. (2002). Distributed systems: principles and paradigms. Upper Saddle River, N.J., USA, Prentice Hall.
-
(2002)
Distributed systems: Principles and paradigms
-
-
Tanenbaum, A.S.1
Steen, M.V.2
-
32
-
-
2142852379
-
Cost-Benefit Analysis for Network Intrusion Detection Systems
-
Washington, D.C, USA
-
Wei, H., Frinke, D., Carter, O. and Ritter, C. (2001 ). Cost-Benefit Analysis for Network Intrusion Detection Systems. Proc. of the CSI 28th Annual Computer Security Conference, Washington, D.C., USA.
-
(2001)
Proc. of the CSI 28th Annual Computer Security Conference
-
-
Wei, H.1
Frinke, D.2
Carter, O.3
Ritter, C.4
|