| Title |
Author |
| UML for the design of secure databases |
Eduardo Fernández-Medina |
| Scrambling covert channels in multilevel secure database systems |
Janusz Getta |
| Java application signature and integrity verification and server
authentication mechanism in mexe terminal |
Jarkko Holappa |
| Verification of authentication protocols using SDL-Method |
Javier López |
| Computer immune system: an overview |
José Fernando Carvajal Vión |
| Security in web database systems development |
Juan Bautista Gómez |
| Real-Time network introsion detection system based on neural networks |
Khaled Al-Ghoneim |
| The PKI Secure Kernel Protection Profile |
Miguel F. Bañón Puente |