{"title":"Update/Patch Management Systems: A Protocol Taxonomy with Security Implications","authors":"A. Colarik, C. Thomborson, L. Janczewski","doi":"10.1007/1-4020-8145-6_5","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_5","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Laboratory Support for Information Security Education","authors":"N. Miloslavskaia, A. Tolstoĭ, D. Ushakov","doi":"10.1007/1-4020-8145-6_7","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_7","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115674327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Private Information Storage with Logarithm-Space Secure Hardware","authors":"A. Iliev, Sean W. Smith","doi":"10.1007/1-4020-8145-6_17","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_17","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130921367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taxonomy of Mixes and Dummy Traffic","authors":"Claudia Díaz, B. Preneel","doi":"10.1007/1-4020-8145-6_18","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_18","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework For Role-based Monitoring of Insider Misuse","authors":"A. H. Phyo, S. Furnell, Francisco Portilla","doi":"10.1007/1-4020-8145-6_4","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_4","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116917839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating a Smart Technology","authors":"K. O'Sullivan, K. Neville, C. Heavin","doi":"10.1007/1-4020-8145-6_6","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_6","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130226103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Corporate Information Security Obedience","authors":"K. Thomson, R. V. Solms","doi":"10.1007/1-4020-8145-6_2","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_2","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115187914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Infusing Privacy Norms in DRM - Incentives and Perspectives from Law","authors":"A. Cameron","doi":"10.1007/1-4020-8145-6_23","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_23","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122875280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Invasive Software in File-Sharing Tools","authors":"A. Jacobsson, Martin Boldt, B. Carlsson","doi":"10.1007/1-4020-8145-6_22","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_22","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"2 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129764000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Do Military Forces Need Ph.D.s?","authors":"R. Dodge","doi":"10.1007/1-4020-8145-6_14","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_14","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}