Title |
Author |
UML for the design of secure databases |
Eduardo Fernández-Medina |
Scrambling covert channels in multilevel secure database systems |
Janusz Getta |
Java application signature and integrity verification and server
authentication mechanism in mexe terminal |
Jarkko Holappa |
Verification of authentication protocols using SDL-Method |
Javier López |
Computer immune system: an overview |
José Fernando Carvajal Vión |
Security in web database systems development |
Juan Bautista Gómez |
Real-Time network introsion detection system based on neural networks |
Khaled Al-Ghoneim |
The PKI Secure Kernel Protection Profile |
Miguel F. Bañón Puente |