Search alternatives:
securite » securities

1
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast...

2
Published 1999
Springer US
Table of Contents: ...I Invited Talks -- 1 E-Commerce Security: No Silver Bullet -- 2 Technical Enforcement...

3
Published 2016
Springer International Publishing
Table of Contents: ...Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception...

4
Published 2007
Springer US
Table of Contents: ...Foundation -- Basic Security Concepts -- Access Control Policies and Languages in Open Environments...

5
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages...

6
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...DeCore: Detecting Content Repurposing Attacks on Clients’ Systems -- Network Security – I...

7
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... in Authentication Protocols -- Secure Location Verification...

8
Published 2020
Springer International Publishing
Table of Contents: ... framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms...

9
Published 2008
Springer US
Table of Contents: ...Using Virtualization to Create and Deploy Computer Security Lab Exercises -- DigForNet: Digital...

10
Published 2011
Springer New York
Table of Contents: ... and defensive Mutualism: Moving Target Defense -- Manipulating Program Functionality to Eliminate Security...

12
Published 2009
Springer Berlin Heidelberg
...Information Systems and Applications, incl. Internet/Web, and HCI...

13
Published 2001
Springer Berlin Heidelberg
Table of Contents: ...: Conceptual Modeling of Internet Sites -- A Frame Work for Modeling Electronic Contracts -- Database Design...