Login / Signup
Inf. Secur. Tech. Rep.
Publications
volume 17, number 3, 2013
Ioannis G. Askoxylakis
,
Mark Manulis
,
Joachim Posegga
Security and privacy for digital ecosystems.
Inf. Secur. Tech. Rep.
17 (3) (2013)
Matteo Dell'Amico
,
Gabriel Serme
,
Muhammad Sabir Idrees
,
Anderson Santana de Oliveira
,
Yves Roudier
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems.
Inf. Secur. Tech. Rep.
17 (3) (2013)
Nikolaos E. Petroulakis
,
Elias Z. Tragos
,
Alexandros G. Fragkiadakis
,
George Spanoudakis
A lightweight framework for secure life-logging in smart environments.
Inf. Secur. Tech. Rep.
17 (3) (2013)
Luigi Catuogno
,
Roberto Gassirà
,
Michele Masullo
,
Ivan Visconti
SmartK: Smart cards in operating systems at kernel level.
Inf. Secur. Tech. Rep.
17 (3) (2013)
Delphine Christin
,
Pablo Sánchez López
,
Andreas Reinhardt
,
Matthias Hollick
,
Michaela Kauer
Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications.
Inf. Secur. Tech. Rep.
17 (3) (2013)
Sherman S. M. Chow
,
Man Ho Au
,
Willy Susilo
Server-aided signatures verification secure against collusion attack.
Inf. Secur. Tech. Rep.
17 (3) (2013)
Martin Franz
,
Björn Deiseroth
,
Kay Hamacher
,
Somesh Jha
,
Stefan Katzenbeisser
,
Heike Schröder
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
Inf. Secur. Tech. Rep.
17 (3) (2013)
Daniel Schreckling
,
Johannes Köstler
,
Matthias Schaff
Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android.
Inf. Secur. Tech. Rep.
17 (3) (2013)
volume 17, number 4, 2013
Amir Herzberg
,
Haya Shulman
Oblivious and fair server-aided two-party computation.
Inf. Secur. Tech. Rep.
17 (4) (2013)
Moritz Riesner
,
Michael Netter
,
Günther Pernul
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments.
Inf. Secur. Tech. Rep.
17 (4) (2013)
Peter Frühwirt
,
Peter Kieseberg
,
Sebastian Schrittwieser
,
Markus Huber
,
Edgar R. Weippl
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs.
Inf. Secur. Tech. Rep.
17 (4) (2013)
Jason L. Wright
,
Miles McQueen
,
Lawrence Wellman
Analyses of two end-user software vulnerability exposure metrics (extended version).
Inf. Secur. Tech. Rep.
17 (4) (2013)
Safaà Hachana
,
Frédéric Cuppens
,
Nora Cuppens-Boulahia
,
Joaquín García-Alfaro
Semantic analysis of role mining results and shadowed roles detection.
Inf. Secur. Tech. Rep.
17 (4) (2013)
Daniel Feledi
,
Stefan Fenz
,
Lukas Lechner
Toward web-based information security knowledge sharing.
Inf. Secur. Tech. Rep.
17 (4) (2013)
Anne Baumgrass
,
Mark Strembeck
Bridging the gap between role mining and role engineering via migration guides.
Inf. Secur. Tech. Rep.
17 (4) (2013)
Thomas Plos
,
Christian Maierhofer
On measuring the parasitic backscatter of sensor-enabled UHF RFID tags.
Inf. Secur. Tech. Rep.
17 (4) (2013)
volume 17, number 1-2, 2012
Patrick Bours
Continuous keystroke dynamics: A different perspective towards biometric evaluation.
Inf. Secur. Tech. Rep.
17 (1-2) (2012)
Guy Bunker
Technology is not enough: Taking a holistic view for information assurance.
Inf. Secur. Tech. Rep.
17 (1-2) (2012)
Anika Pflug
,
Daniel Hartung
,
Christoph Busch
Feature extraction from vein images using spatial information and chain codes.
Inf. Secur. Tech. Rep.
17 (1-2) (2012)
Simon Walker
Economics and the cyber challenge.
Inf. Secur. Tech. Rep.
17 (1-2) (2012)
Vladimir Jirasek
Practical application of information security models.
Inf. Secur. Tech. Rep.
17 (1-2) (2012)
Ethel Quayle
,
Max Taylor
Corrigendum to "Social networking as a nexus for engagement and exploitation of young people" [Inform Secur Tech Rep 16 (2) (2011) 44-50].
Inf. Secur. Tech. Rep.
17 (1-2) (2012)
volume 16, number 1, 2011
Yacine Rebahi
,
Mohamed Nassar
,
Thomas Magedanz
,
Olivier Festor
A survey on fraud and service misuse in voice over IP (VoIP) networks.
Inf. Secur. Tech. Rep.
16 (1) (2011)
Ge Zhang
,
Yacine Rebahi
Side effects of identity management in SIP VoIP environment.
Inf. Secur. Tech. Rep.
16 (1) (2011)
Claudio Mazzariello
,
Paolo De Lutiis
,
Dario Lombardo
Clustering NGN user behavior for anomaly detection.
Inf. Secur. Tech. Rep.
16 (1) (2011)
Serap Atay
,
Marcelo Masera
Challenges for the security analysis of Next Generation Networks.
Inf. Secur. Tech. Rep.
16 (1) (2011)
Stephen D. Wolthusen
Next generation networks.
Inf. Secur. Tech. Rep.
16 (1) (2011)
volume 16, number 2, 2011
Paul Andrew Watters
,
Robert Layton
,
Richard Dazeley
How much material on BitTorrent is infringing content? A case study.
Inf. Secur. Tech. Rep.
16 (2) (2011)
Paul A. Watters
Social networking threats.
Inf. Secur. Tech. Rep.
16 (2) (2011)
Gaurav Gupta
,
Josef Pieprzyk
,
Len Hamey
Bucket attack on numeric set watermarking model and safeguards.
Inf. Secur. Tech. Rep.
16 (2) (2011)
George R. S. Weir
,
Fergus Toolan
,
Duncan N. Smeed
The threats of social networking: Old wine in new bottles?
Inf. Secur. Tech. Rep.
16 (2) (2011)
Ethel Quayle
,
Max Taylor
Social networking as a nexus for engagement and exploitation of young people.
Inf. Secur. Tech. Rep.
16 (2) (2011)
Gaurav Gupta
,
Josef Pieprzyk
Socio-technological phishing prevention.
Inf. Secur. Tech. Rep.
16 (2) (2011)
Man Qi
,
Denis Edgar-Nevill
Social networking searching and privacy issues.
Inf. Secur. Tech. Rep.
16 (2) (2011)
Mofakharul Islam
,
Paul Andrew Watters
,
John Yearwood
Real-time detection of children's skin on social networking sites using Markov random field modelling.
Inf. Secur. Tech. Rep.
16 (2) (2011)
volume 16, number 3-4, 2011
Zaheer Ahmad
,
Keith Mayes
,
Song Dong
,
Konstantinos Markantonakis
Considerations for mobile authentication in the Cloud.
Inf. Secur. Tech. Rep.
16 (3-4) (2011)
André van Cleeff
,
Wolter Pieters
,
Roel J. Wieringa
,
Frits van Tiel
Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization.
Inf. Secur. Tech. Rep.
16 (3-4) (2011)
Piers Wilson
Positive perspectives on cloud security.
Inf. Secur. Tech. Rep.
16 (3-4) (2011)
Lizzie Coles-Kemp
,
Joseph Reddington
,
Patricia A. H. Williams
Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud.
Inf. Secur. Tech. Rep.
16 (3-4) (2011)
Ulrich Lang
,
Rudolf Schreiner
Analysis of recommended cloud security controls to validate OpenPMF "policy as a service".
Inf. Secur. Tech. Rep.
16 (3-4) (2011)
Imad M. Abbadi
,
Andrew P. Martin
Trust in the Cloud.
Inf. Secur. Tech. Rep.
16 (3-4) (2011)
David Teneyuca
Internet cloud security: The illusion of inclusion.
Inf. Secur. Tech. Rep.
16 (3-4) (2011)
Paul G. Dorey
,
Armando Leite
Commentary: Cloud computing - A security problem or solution?
Inf. Secur. Tech. Rep.
16 (3-4) (2011)
volume 15, number 3, 2010
William Walker
Mobile telephony security compromises.
Inf. Secur. Tech. Rep.
15 (3) (2010)
volume 15, number 4, 2010
J. Andrew Valentine
Compliance complacency: How 'check-box' compliancy remains a pitfall for many organizations worldwide.
Inf. Secur. Tech. Rep.
15 (4) (2010)
Georges Ataya
PCI DSS audit and compliance.
Inf. Secur. Tech. Rep.
15 (4) (2010)
André Mariën
Matchmaking between PCI-DSS and Security.
Inf. Secur. Tech. Rep.
15 (4) (2010)
Branden R. Williams
How tokenization and encryption can enable PCI DSS compliance.
Inf. Secur. Tech. Rep.
15 (4) (2010)
Jeff Tutton
Incident response and compliance: A case study of the recent attacks.
Inf. Secur. Tech. Rep.
15 (4) (2010)
Gunnar Peterson
From auditor-centric to architecture-centric: SDLC for PCI DSS.
Inf. Secur. Tech. Rep.
15 (4) (2010)