Content of Issue 15
DOI: 10.3217/jucs-015-15
|
Security in Information Systems: New Advances and Tendencies |
E. Fernández-Medina, A. Rodríguez |
2912 |
SeAAS - A Reference Architecture for Security Services in SOA |
M. Hafner, M. Memon, R. Breu |
2916 |
Information Theoretically Secure Encryption with Almost Free Authentication |
B. Alomair, R. Poovendran |
2937 |
ModelSec: A Generative Architecture for Model-Driven Security |
Ó. Sánchez, F. Molina, J. García-Molina, A. Toval |
2957 |
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers |
P. Caballero-Gil, A. Fúster-Sabater, C. Hernández-Goya |
2981 |
A User Controlled Approach for Securing Sensitive Information in Directory Services |
W. Claycomb, D. Shin |
2999 |
Optimizations for Risk-Aware Secure Supply Chain Master Planning |
A. Schröpfer, F. Kerschbaum, C. Schütz, R. Pibernik |
3019 |
Managing Security and its Maturity in Small and Medium-sized Enterprises |
L.E. Sánchez, A. Santos-Olmo Parra, D.G. Rosado, M. Piattini |
3038 |
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases |
C.A. Visaggio, F. de Rosa |
3059 |