 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
H.B. Attia, L. Kahloul, S. Benharzallah: A New Hybrid Access Control Model for Security Policies in Multimodal Applications Environments /jucs_24_4/a_new_hybrid_access |
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
C. Blanco, I. García-Rodríguez de Guzmán, E. Fernández-Medina, J. Trujillo: Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications /jucs_20_2/showing_the_benefits_of |
|
 |
C.-L. Botha, E. Kritzinger, M. Loock: A Framework for the Comparison of Best Practice Recommendations and Legal Requirements for South African Banks /jucs_18_6/a_framework_for_the |
|
 |
I. Caballero, L.E. Sánchez, A. Freitas, E. Fernández-Medina: HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management /jucs_18_12/hc%2B_towards_a_framework |
|
 |
P. Caballero-Gil, A. Fúster-Sabater, C. Hernández-Goya: Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers /jucs_15_15/graph_based_approach_to |
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
R. Keidel, S. Wendzel, S. Zillien, E.S. Conner, G. Haas: WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms /jucs_24_5/wodicof_a_testbed_for |
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
Y. Lakhdhar, S. Rekhis, N. Boudriga: A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios /jucs_25_9/a_context_based_defense |
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
O. Rebollo, D. Mellado, E. Fernández-Medina: A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment /jucs_18_6/a_systematic_review_of |
|
 |
|
|
 |
|
|
 |
A. Ruiz-Martínez, C.I. Marín-López, L. Baño-López, A.F. Gómez-Skarmeta: A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing /jucs_15_3/a_new_fair_nonrepudiation |
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|