K. Forcht, C. Allen, Barbara Brodman, David Corning, J. Kouns
{"title":"Intrusion Detection Systems: Possibilities for the Future","authors":"K. Forcht, C. Allen, Barbara Brodman, David Corning, J. Kouns","doi":"10.1007/0-306-47007-1_14","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_14","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123082521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing a Secure System for Implementing Chip Cards in the Financial Services Industry","authors":"Terry Stanley","doi":"10.1007/978-0-387-35575-7_16","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_16","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123236941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security aspects of a Java-servlet-based web-hosted e-mail system","authors":"E. Hepworth, U. Ultes-Nitsche","doi":"10.1007/978-0-387-35575-7_10","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_10","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130270330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Intranet Authorization Paradigm","authors":"M. Vandenwauver, P. Ashley, Gary Gaskell","doi":"10.1007/978-0-387-35575-7_12","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_12","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Future of Australian & New Zealand Security Standard AS/NZS 4444?","authors":"M. Warren, W. Hutchinson","doi":"10.1007/978-0-387-35575-7_4","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_4","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125267226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Electronic Commerce Environment: Only with 'Smart Cards'","authors":"W. Caelli","doi":"10.1007/978-0-387-35575-7_18","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_18","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133365172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A practical approach to manage data communication security","authors":"P. Samwel, Marcel E. M. Spruit","doi":"10.1007/978-0-387-35575-7_3","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_3","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121868152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time as an Aid to Improving Security in Smart Cards","authors":"V. Cordonnier, Anthony Watson, S. Nemchenko","doi":"10.1007/978-0-387-35575-7_11","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_11","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach to standardizing security analysis methods for virtual systems","authors":"Ann Frisinger, L. Yngström","doi":"10.1007/978-0-387-35575-7_6","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_6","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123650621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Principles of Iris Recognition","authors":"M. Negin, Machiel van der Harst","doi":"10.1007/978-0-387-35575-7_15","DOIUrl":"https://doi.org/10.1007/978-0-387-35575-7_15","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123103889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}