%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.00", %%% date = "08 May 2022", %%% time = "07:58:26 MDT", %%% filename = "infosectechrep.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "http://www.math.utah.edu/~beebe", %%% checksum = "09209 14729 52925 603626", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "bibliography; BibTeX; Information Security %%% Technical Report", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a COMPLETE bibliography of the %%% journal Information Security Technical Report %%% (CODEN ISTRFR, ISSN 1363-4127 (print), %%% 1873-605X (electronic)) published by %%% Elsevier. Publication began with volume 1, %%% number 1, in 1996, and terminated with volume %%% 17, number 4, in May 2013. The journal was %%% then renamed to the Journal of Information %%% Security and Applications (JISA), but volume %%% numbering continued. That successor journal %%% is covered in a separate bibliography, %%% jinfosecappl.bib. %%% %%% At version 1.00, the COMPLETE year coverage %%% looked like this: %%% %%% 1996 ( 39) 2005 ( 32) 2014 ( 0) %%% 1997 ( 40) 2006 ( 34) 2015 ( 0) %%% 1998 ( 60) 2007 ( 35) 2016 ( 0) %%% 1999 ( 95) 2008 ( 27) 2017 ( 0) %%% 2000 ( 39) 2009 ( 34) 2018 ( 0) %%% 2001 ( 40) 2010 ( 25) 2019 ( 0) %%% 2002 ( 35) 2011 ( 21) 2020 ( 0) %%% 2003 ( 36) 2012 ( 6) 2021 ( 0) %%% 2004 ( 8) 2013 ( 17) 2022 ( 27) %%% %%% Article: 650 %%% %%% Total entries: 650 %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{ "\hyphenation{Ur-i-be}" # "\ifx \undefined \bioname \def \bioname#1{{{\em #1\/}}} \fi" # "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" # "\ifx \undefined \circled \def \circled #1{(#1)}\fi" # "\ifx \undefined \insttitle \def \insttitle#1{{{\em #1}}} \fi" # "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi" # "\ifx \undefined \reg \def \reg {\circled{R}}\fi" # "\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi" } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 585 1640, +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|http://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-INFO-SEC-TECH-REP = "Information Security Technical Report"} %%% ==================================================================== %%% Bibliography entries, sorted in publication order: @Article{Anonymous:1996:Pa, author = "Anonymous", title = "Pages 1--69 (1996)", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "??--??", month = "????", year = "1996", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1996:EB, author = "Anonymous", title = "{Editorial Board}", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "i--i", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(96)90094-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412796900941", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hardy:1996:Ia, author = "Gary Hardy", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "1--3", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(96)90095-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412796900953", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1996:NUa, author = "Anonymous", title = "News update", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "4--5", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(96)90096-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412796900965", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1996:RHa, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "6--9", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(96)90097-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412796900977", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Leach:1996:TC, author = "John Leach", title = "{TTP} concepts", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "10--18", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/1363-4127(96)89802-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/1363412796898025", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{vanDijken:1996:BRS, author = "Pieter van Dijken", title = "Business requirements for secure electronic communications", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "19--25", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/1363-4127(96)89803-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/1363412796898037", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{DiTosto:1996:RTG, author = "Nanette {Di Tosto}", title = "Requirements for a trusted global public key initiative", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "26--31", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/1363-4127(96)89804-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/1363412796898049", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Herson:1996:ETT, author = "David Herson", title = "Ethical trusted third party services --- a new security approach", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "32--33", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/1363-4127(96)89805-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/1363412796898050", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hickson:1996:DVP, author = "Nigel Hickson", title = "{DTI} views on the provision of encryption services on public networks", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "34--39", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/1363-4127(96)89806-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/1363412796898062", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Edwards:1996:BTP, author = "Andrew Edwards", title = "{Bolero} --- a {TTP} project for the shipping industry", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "40--45", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/1363-4127(96)89807-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/1363412796898074", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Winsborrow:1996:ETP, author = "Richard Winsborrow", title = "{EBridge} --- a {TTP} project for business registers", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "46--51", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/1363-4127(96)89808-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/1363412796898086", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{VanAuseloos:1996:RTT, author = "Jan {Van Auseloos}", title = "Responsibilities of {TTPs} in trusted networks", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "52--56", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/1363-4127(96)89809-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/1363412796898098", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Landrock:1996:PET, author = "Peter Landrock", title = "Practical experiences with {TTP} schemes", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "57--62", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/1363-4127(96)89810-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/1363412796898104", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mitchell:1996:RHT, author = "Chris J. Mitchell and {Information Security Group}", title = "The {Royal Holloway} {TTP}-based key escrow scheme", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "1", pages = "63--69", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/1363-4127(96)89811-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/1363412796898116", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1996:Pb, author = "Anonymous", title = "Pages 1--71 (1996)", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "2", pages = "??--??", month = "????", year = "1996", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hardy:1996:Ib, author = "Gary Hardy", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "2", pages = "1--2", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89350-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797893508", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1996:NUb, author = "Anonymous", title = "News update", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "2", pages = "3--4", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89351-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279789351X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1996:RHb, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "2", pages = "5--9", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(96)90004-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412796900047", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Horrell:1996:SDS, author = "Mike Horrell", title = "The security of distributed systems --- an overview", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "2", pages = "10--16", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89352-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797893521", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Oxley:1996:SDE, author = "Simon Oxley", title = "Securing a distributed environment --- a practical case study", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "2", pages = "17--28", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89353-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797893533", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Girt:1996:MAR, author = "Keith Girt", title = "Managing access rights in the distributed world", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "2", pages = "29--35", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89354-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797893545", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Galsworthy:1996:IPD, author = "Joe Galsworthy", title = "Information protection and data back-up in a distributed environment", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "2", pages = "36--45", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89355-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797893557", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hardy:1996:TBS, author = "Gary Hardy", title = "The truth behind single sign-on", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "2", pages = "46--55", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89356-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797893569", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Fairthorne:1996:SCD, author = "Belinda Fairthorne", title = "Security in {CORBA} distributed object systems", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "2", pages = "56--63", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89357-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797893570", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1996:OBS, author = "Anonymous", title = "Opening up business securely", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "2", pages = "64--71", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(96)90005-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412796900059", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1996:Pc, author = "Anonymous", title = "Pages 1--61 (1996)", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "??--??", month = "????", year = "1996", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hardy:1996:Ic, author = "Gary Hardy", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "1--2", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)83011-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797830117", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1996:RHc, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "3--7", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)83012-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797830129", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pepper:1996:TO, author = "Bill Pepper", title = "Trends in outsourcing", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "8--10", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)83013-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797830130", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Blackley:1996:SCO, author = "John A. Blackley and John Leach", title = "Security considerations in outsourcing {IT} services", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "11--17", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)83014-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797830142", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Peltier:1996:RAO, author = "Tom Peltier", title = "The risk of allowing outside staff access to your information systems", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "18--28", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)83015-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797830154", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Greenland:1996:VV, author = "John Greenland", title = "A vendor's view", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "29--32", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)83016-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797830166", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Iyer:1996:YCO, author = "Nigel K. Iyer and Richard T. Kusnierz", title = "You can outsource many activities but not fraud!", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "33--37", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)83017-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797830178", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pepper:1996:OAA, author = "Bill Pepper", title = "Obtaining assurance about your security", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "38--47", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)83018-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279783018X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pepper:1996:SSL, author = "Bill Pepper", title = "Security service level agreements for outsourced security functions", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "48--50", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)83019-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797830191", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1996:OML, author = "Anonymous", title = "Outsourcing --- The major legal issues", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "51--56", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)83020-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797830208", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Honess:1996:OLP, author = "Sandra Honess", title = "Outsourcing --- a legal perspective on contract critical success factors", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "57--58", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(96)90093-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279690093X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pepper:1996:ISS, author = "Bill Pepper", title = "Information security standards for outsourcing", journal = j-INFO-SEC-TECH-REP, volume = "1", number = "3", pages = "59--61", month = "????", year = "1996", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)83021-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:20 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279783021X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1997:Pa, author = "Anonymous", title = "Pages 1--64 (1997)", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "??--??", month = "????", year = "1997", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hardy:1997:Ia, author = "Gary Hardy", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "1--2", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80872-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808722", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1997:UDR, author = "Anonymous", title = "{UK DTI} releases public consultation paper on {TTP} licencing", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "3--4", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80873-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808734", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Austen:1997:CLR, author = "John Austen", title = "Can the laws really cut down hacking?", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "5, 10--14", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80874-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808746", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Kelman:1997:RVR, author = "Alistair Kelman", title = "The regulation of virus research: Prosecution for `unlawful research'?", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "5, 15--18", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80875-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808758", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{List:1997:CCG, author = "William List", title = "The common criteria --- Good, bad or indifferent?", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "5--6, 19--23", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80876-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279780876X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hickson:1997:SEC, author = "Nigel Hickson", title = "Security evaluation and certification: the future of a national scheme", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "6, 24--28", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80877-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808771", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Amery:1997:EUD, author = "Chris Amery", title = "The {European Union Data Protection Directive} --- Where are we? {How} did we get here? {What} next?", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "6--7, 29--37", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80878-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808783", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Woulds:1997:IPS, author = "John Woulds", title = "Information privacy and security --- a regulator's priorities", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "7, 38--42", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80879-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808795", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Blight:1997:CPV, author = "Jim Blight", title = "Customer privacy versus customer service", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "7, 43--46", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80880-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808801", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Millard:1997:IED, author = "Christopher Millard", title = "Impact of the {EU Data Protection Directive} on transborder data flows", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "8, 47--49", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80881-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808813", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sundt:1997:CVO, author = "Chris Sundt", title = "A commercial view of the {OECD} recommendations on cryptography policy", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "8, 50--57", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80882-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808825", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hancock:1997:SMY, author = "Bill Hancock", title = "Stop that e-mail! {You} are probably breaking the law!", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "8--9, 58--61", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80883-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808837", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bigelow:1997:ECU, author = "Robert Bigelow", title = "Encryption controls are {US} government priority", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "1", pages = "9, 62--64", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80884-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797808849", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1997:Pb, author = "Anonymous", title = "Pages 1--97 (1997)", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "??--??", month = "????", year = "1997", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hardy:1997:Ib, author = "Gary Hardy", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "1--2", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81321-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797813210", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1997:RHa, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "3--9", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)90024-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797900248", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Piper:1997:IC, author = "Fred Piper", title = "Introduction to cryptology", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "10--13", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81322-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797813222", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Davies:1997:BHC, author = "Donald Davies", title = "A brief history of cryptography", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "14--17", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81323-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797813234", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Murphy:1997:DAC, author = "Sean Murphy", title = "The difficulty of attacking cryptosystems", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "18--21", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81324-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797813246", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Coppersmith:1997:DES, author = "Don Coppersmith and Chris Holloway and Stephen M. Matyas and Nev Zunic", title = "The {Data Encryption Standard}", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "22--24", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81325-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797813258", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mitchell:1997:AUC, author = "Chris Mitchell", title = "Authentication using cryptography", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "25--32", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81326-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279781326X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Preneel:1997:MHF, author = "Bart Preneel", title = "{MACs} and hash functions: State of the art", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "33--43", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81327-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib; http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797813271", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Halliden:1997:MSK, author = "Paul Halliden", title = "The management of symmetric keys", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "44--53", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81328-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797813283", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Zaba:1997:CSI, author = "Stefek Zaba", title = "Cryptographic security in the internet protocol suite: Practice and proposals", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "54--73", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81329-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797813295", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Fuchsberger:1997:MC, author = "Andreas Fuchsberger", title = "{Microsoft CryptoAPI}", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "74--77", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81330-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797813301", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Vanstone:1997:ECC, author = "Scott A. Vanstone", title = "Elliptic curve cryptosystem --- The answer to strong, fast public-key cryptography for securing constrained environments", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "78--87", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81331-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797813313", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Phoenix:1997:QCP, author = "Simon J. D. Phoenix and Paul D. Townsend", title = "Quantum cryptography: Protecting our future networks with quantum mechanics", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "2", pages = "88--97", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)81332-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797813325", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1997:Pc, author = "Anonymous", title = "Pages 1--86 (1997)", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "??--??", month = "????", year = "1997", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hardy:1997:Ic, author = "Gary Hardy", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "1--1", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89703-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797897038", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1997:RHb, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "2--7", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89704-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279789704X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sherwood:1997:SIT, author = "John Sherwood", title = "Security issues in today's corporate network", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "8--17", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89705-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797897051", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mansfield:1997:CUC, author = "Nick Mansfield", title = "Commercial use of cryptography in the shell companies", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "18--20", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89706-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797897063", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Walker:1997:STL, author = "John Walker and {Information Security Policy Group}", title = "Should {TTPs} be licensed?", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "21--27", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89707-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797897075", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Klaus:1997:NSA, author = "Christopher W. Klaus", title = "Network security: Anything but bulletproof", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "28--32", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89708-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797897087", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ranum:1997:TAF, author = "Marcus J. Ranum", title = "Thinking about firewalls {V2.0}: Beyond perimeter security", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "33--45", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89709-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797897099", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ranum:1997:SSI, author = "Marcus J. Ranum", title = "Strategic security for {IP} networks", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "46--52", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89710-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797897105", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{White:1997:WNS, author = "Ian White", title = "{Windows NT} security", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "53--65", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89711-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797897117", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{McNamarra:1997:UNS, author = "Roy McNamarra", title = "{Unix} network security", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "66--79", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89712-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797897129", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hardy:1997:RPT, author = "Gary Hardy", title = "The relevance of penetration testing to corporate network security", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "3", pages = "80--86", month = "????", year = "1997", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)89713-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:21 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797897130", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:Pa, author = "Anonymous", title = "Pages 3--77 (1998)", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "4", pages = "??--??", month = "????", year = "1998", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:1998:Ia, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "4", pages = "3--4", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80787-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279780787X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:RHa, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "4", pages = "5--11", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80788-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797807881", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ganley:1998:DS, author = "Michael J. Ganley", title = "Digital signatures", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "4", pages = "12--22", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80789-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797807893", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ward:1998:DCP, author = "Michael Ward", title = "Digital certificates and payment systems", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "4", pages = "23--31", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80790-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279780790X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Venables:1998:CFP, author = "Phil Venables", title = "A commercial future of public key cryptography: Shrink wrapping trust for profit", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "4", pages = "32--40", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80791-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797807911", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Martin:1998:ACW, author = "Keith Martin", title = "Applying cryptography within the {ASPeCT Project}", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "4", pages = "41--53", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80792-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797807923", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Fuchsberger:1998:GA, author = "Andreas Fuchsberger", title = "{GSS-API}", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "4", pages = "54--61", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80793-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797807935", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pierson:1998:NE, author = "Charles Pierson", title = "Network encryption", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "4", pages = "62--65", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80794-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797807947", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Brookson:1998:CSP, author = "Charles Brookson", title = "Cryptography systems: Putting theory into practice", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "4", pages = "66--72", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80795-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797807959", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{DeClercq:1998:USE, author = "Luc {De Clercq}", title = "User security enhancement: a worldwide security project", journal = j-INFO-SEC-TECH-REP, volume = "2", number = "4", pages = "73--77", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(97)80796-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412797807960", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:Pb, author = "Anonymous", title = "Pages 1--108 (1998)", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "??--??", month = "????", year = "1998", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:EB, author = "Anonymous", title = "{Editorial Board}", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "i--i", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)90000-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798900000", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:1998:Ib, author = "Chez Ciechanowicz and {Information Security Group}", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "1--1", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80012-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800125", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:RHb, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "2--13", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80013-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800137", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Markowitz:1998:SR, author = "Judith A. Markowitz", title = "Speaker recognition", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "14--20", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80014-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800149", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{OGorman:1998:OFV, author = "Lawrence O'Gorman", title = "An overview of fingerprint verification technologies", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "21--32", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80015-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800150", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Daugman:1998:RPT, author = "John Daugman", title = "Recognizing people by their iris patterns", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "33--39", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80016-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800162", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pampus:1998:FRO, author = "Juergen Pampus and Frank Weber", title = "Facial recognition --- an overview", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "40--46", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80017-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800174", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sweeney:1998:VTP, author = "Eugene Sweeney", title = "{Veincheck} --- a technical perspective", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "47--51", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80018-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800186", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Fairhurst:1998:NPA, author = "M. C. Fairhurst", title = "New perspectives in automatic signature verification", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "52--59", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80019-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800198", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Carter:1998:IIB, author = "Bob Carter", title = "Implementation implications of biometrics", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "60--69", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80020-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800204", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mansfield:1998:MCP, author = "Tony Mansfield and Gavin Kelly", title = "Measuring and comparing the performance of biometric systems", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "70--76", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80021-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800216", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Rejman-Greene:1998:SCU, author = "Marek Rejman-Greene", title = "Security considerations in the use of biometric devices", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "77--80", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80022-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800228", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Chandler:1998:CVR, author = "Ian Chandler", title = "Cardholder verification --- Realities at point-of-sale", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "81--85", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80023-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279880023X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Thomas:1998:WCA, author = "Stephen Thomas", title = "Will commercial applications for biometric-based solutions really take off in 1998?", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "86--89", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80024-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800241", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Davies:1998:BCL, author = "Simon Davies", title = "Biometrics --- a civil liberties and privacy perspective", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "90--94", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80025-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800253", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hawkes:1998:BTL, author = "Peter Hawkes and Association for Biometrics", title = "Biometrics and {Turing}'s legacy", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "95--97", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80026-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib; http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800265", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:GBT, author = "Anonymous", title = "1998 Glossary of biometric terms", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "1", pages = "98--108", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)90001-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:22 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798900012", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:Pc, author = "Anonymous", title = "Pages 1--110 (1998)", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "??--??", month = "????", year = "1998", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:1998:Ic, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "1--2", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(98)80001-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404898800010", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:RHc, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "3--17", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)90004-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798900048", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Khan:1998:DPK, author = "Liaquat Khan", title = "Deploying public key infrastructures", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "18--33", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(98)80002-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404898800022", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Zaba:1998:TPC, author = "Stefek Zaba", title = "Tools and protocols for E-commerce", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "34--40", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(98)80003-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404898800034", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Stirland:1998:SSE, author = "Mark Stirland", title = "Smartcards in secure Electronic Commerce", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "41--54", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(98)80004-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404898800046", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Landrock:1998:WWY, author = "Peter Landrock and Torben Pedersen", title = "{WYSIWYS}? --- {What} you see is what you sign?", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "55--61", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(98)80005-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404898800058", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Gollmann:1998:SCB, author = "Dieter Gollmann and Ulrich Lang", title = "Security in {CORBA}-based electronic commerce systems", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "62--70", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(98)80006-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S016740489880006X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Aldhouse:1998:DPE, author = "Francis Aldhouse", title = "Data protection and Electronic Commerce", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "71--81", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(98)80007-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404898800071", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Markantonakis:1998:JCT, author = "Constantinos Markantonakis", title = "{Java} card technology and security", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "82--89", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(98)80008-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404898800083", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dennis:1998:PKN, author = "Keith R. Dennis", title = "Public key network infrastructure: an evolutionary step in the ascent of {WAN}", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "90--97", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(98)80009-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404898800095", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dosdale:1998:ES, author = "T. Dosdale and C. N. Rasmussen", title = "{EDI} security", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "2", pages = "98--110", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(98)80010-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404898800101", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:Pd, author = "Anonymous", title = "Pages 1--70 (1998)", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "3", pages = "??--??", month = "????", year = "1998", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:1998:Id, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "3", pages = "1--2", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80011-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800113", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:RHd, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "3", pages = "3--14", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)90002-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798900024", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hayday:1998:WNS, author = "John Hayday", title = "{Windows NT} security architecture", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "3", pages = "15--22", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80027-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800277", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hayday:1998:WNR, author = "John Hayday", title = "{Windows NT} --- Remote access", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "3", pages = "23--30", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80028-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800289", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{White:1998:DWN, author = "Ian White", title = "Developing a {Windows NT} security policy", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "3", pages = "31--43", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80029-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800290", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Wiseman:1998:ASL, author = "Simon Wiseman", title = "Adding security labelling to {Windows NT}", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "3", pages = "44--52", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80030-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800307", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pittaway:1998:DSSa, author = "Glenn Pittaway", title = "Distributed security services in {Microsoft Windows NT 5.0} --- {Kerberos} and the active directory", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "3", pages = "53--64", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80031-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800319", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Brundrett:1998:KAW, author = "Peter Brundrett", title = "{Kerberos} authentication in {Windows NT 5.0} domains", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "3", pages = "65--70", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80032-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800320", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:Pe, author = "Anonymous", title = "Pages 1--86 (1998)", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "4", pages = "??--??", month = "????", year = "1998", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:1998:Ie, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "4", pages = "1--2", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80033-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800332", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1998:RHe, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "4", pages = "3--14", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80034-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800344", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Venables:1998:SMH, author = "Phil Venables", title = "Security monitoring in heterogeneous globally distributed environments", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "4", pages = "15--31", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80035-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800356", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schepers:1998:NVH, author = "Filip Schepers", title = "Network-versus host-based intrusion detection", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "4", pages = "32--42", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80036-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800368", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pittaway:1998:DSSb, author = "Glenn Pittaway", title = "Distributed security services in {Microsoft Windows 2000} ({Windows NT 5.0}): Protecting data in the enterprise", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "4", pages = "43--52", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80037-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279880037X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ranum:1998:IGT, author = "Marcus J. Ranum and Kent Landfield and Mike Stolarchuk and Mark Sienkiewicz and Andrew Lambeth and Eric Wall", title = "Implementing a generalized tool for network monitoring", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "4", pages = "53--64", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80038-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800381", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{McNamara:1998:NWD, author = "Roy McNamara", title = "Networks --- Where does the real threat lie?", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "4", pages = "65--74", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80039-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800393", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bates:1998:FCF, author = "Jim Bates", title = "Fundamentals of computer forensics", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "4", pages = "75--78", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80040-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279880040X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Barker:1998:VIM, author = "Robin Barker and Gavin Kelly", title = "The Vulnerability Instantiation Methodology prototype", journal = j-INFO-SEC-TECH-REP, volume = "3", number = "4", pages = "79--86", month = "????", year = "1998", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(98)80041-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:23 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412798800411", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:Pa, author = "Anonymous", title = "Pages 1--60 (1999)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "1", pages = "??--??", month = "????", year = "1999", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:EB, author = "Anonymous", title = "{Editorial Board}", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "1", pages = "i--i", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)90008-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799900080", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:1999:Ia, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "1", pages = "1--2", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80001-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800016", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Shawe-Taylor:1999:DFMa, author = "John Shawe-Taylor and Keith Howker and Peter Burge", title = "Detection of fraud in mobile telecommunications", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "1", pages = "3--15", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80002-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800028", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Shawe-Taylor:1999:DFMb, author = "John Shawe-Taylor and Keith Howker and Peter Burge", title = "Detection of fraud in mobile telecommunications", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "1", pages = "16--28", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80003-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279980003X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Roelofsen:1999:CATa, author = "Gert Roelofsen", title = "Cryptographic algorithms in telecommunications systems", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "1", pages = "29--37", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80004-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800041", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Collins:1999:HSTa, author = "Simon Collins", title = "How secure are telecoms internetwork communications?", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "1", pages = "38--41", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80005-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800053", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Johnston:1999:SISa, author = "Thomas F. Johnston", title = "Security issues in a satellite global {GSM} network", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "1", pages = "42--52", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80006-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800065", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Walker:1999:DTSa, author = "Michael Walker", title = "The direction of telecommunications security", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "1", pages = "53--60", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80007-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800077", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:Pb, author = "Anonymous", title = "Pages 1--77 (1999)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "2", pages = "??--??", month = "????", year = "1999", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:1999:Ib, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "2", pages = "1--1", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(99)80008-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404899800089", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:RHa, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "2", pages = "3--12", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(99)80009-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404899800090", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Paterson:1999:CYWa, author = "Mike Paterson", title = "The chip in your wallet --- The technology of security in smartcard chip manufacture", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "2", pages = "13--18", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(99)80010-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404899800107", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Girard:1999:NSIa, author = "Pierre Girard and Jean-Louis Lanet", title = "New security issues raised by open cards", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "2", pages = "19--27", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(99)80011-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404899800119", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Kuhn:1999:PSSa, author = "Markus Kuhn and Oliver K{\"o}mmerling", title = "Physical security of smartcards", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "2", pages = "28--41", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(99)80012-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404899800120", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Cherrill:1999:SCa, author = "D. Cherrill and A. Brocklehurst", title = "Smartcard certfication", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "2", pages = "42--50", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(99)80013-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404899800132", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ward:1999:EISa, author = "Mike Ward", title = "{EMV} --- The {ICC} specifications for payment systems", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "2", pages = "51--57", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(99)80014-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404899800144", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ayer:1999:MSC, author = "Kenneth R. Ayer", title = "Mitigating smart card risks", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "2", pages = "58--63", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(99)80015-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404899800156", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Beric:1999:MSSa, author = "John Beric", title = "{Mondex} security strategy", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "2", pages = "64--68", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(99)80016-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0167404899800168", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Markantonakis:1999:ISAa, author = "Constantinos Markantonakis", title = "Interfacing with smartcard applications --- (The {Open Card Framework} and {PC\slash SC})", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "2", pages = "69--77", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S0167-4048(99)80017-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S016740489980017X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:Pc, author = "Anonymous", title = "Pages 1--69 (1999)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "3", pages = "??--??", month = "????", year = "1999", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:1999:Ic, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "3", pages = "1--1", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80073-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800739", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:RHb, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "3", pages = "3--11", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80074-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800740", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Jones:1999:IWW, author = "A. Jones", title = "Information warfare --- what is it?", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "3", pages = "12--19", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80075-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800752", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Nash:1999:BBP, author = "Colin L. Nash and Cathy K. Piggott", title = "Beyond boundary protection devices --- The concept of recovery", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "3", pages = "20--27", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80076-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800764", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Rathmell:1999:ICP, author = "Andrew Rathmell", title = "International {CIP} policy: Problems and prospects", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "3", pages = "28--42", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80077-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800776", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Blyth:1999:FID, author = "Andrew Blyth", title = "Footprinting for intrusion detection and threat assessment", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "3", pages = "43--53", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80078-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800788", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Zavidniak:1999:AIR, author = "Paul Zavidniak and Anita D'Amico and Dennis H. McCallam", title = "Achieving information resiliency", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "3", pages = "54--62", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80079-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279980079X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Millar:1999:DIW, author = "Bill Millar", title = "Defensive information warfare", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "3", pages = "63--69", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80080-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:24 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800806", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:Pd, author = "Anonymous", title = "Pages 1--62 (1999)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "4", pages = "??--??", month = "????", year = "1999", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:1999:Id, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "4", pages = "1--2", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80081-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800818", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:RHc, author = "Anonymous", title = "Report highlights", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "4", pages = "3--11", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80082-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279980082X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Murphy:1999:AES, author = "Sean Murphy", title = "The {Advanced Encryption Standard (AES)}", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "4", pages = "12--17", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80083-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800831", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mansfield:1999:DPP, author = "Nick Mansfield", title = "Designing a practical {Public Key Infrastructure (PKI)}", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "4", pages = "18--27", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80084-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800843", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Naccache:1999:PAR, author = "David Naccache", title = "Padding attacks on {RSA}", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "4", pages = "28--33", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80085-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800855", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Landrock:1999:CCV, author = "Peter Landrock", title = "Challenging the conventional view of {PKI} --- will it really work?", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "4", pages = "34--39", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80086-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800867", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Zaba:1999:NMC, author = "Stefek Zaba", title = "The {NSAKEY} in {Microsoft}'s crypto {API}: facts, fiction and speculation", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "4", pages = "40--46", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80087-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800879", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Beth:1999:SPK, author = "Thomas Beth", title = "The state of public-key cryptography --- not only after the invention of quantum computers", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "4", pages = "47--52", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80088-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800880", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dobbertin:1999:SHP, author = "Hans Dobbertin", title = "Secure hashing in practice", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "4", pages = "53--62", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80089-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib; http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800892", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:Pe, author = "Anonymous", title = "Pages 4--34 (1999)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "??--??", month = "????", year = "1999", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Paterson:1999:CYWb, author = "Mike Paterson", title = "The chip in your wallet --- the technology of security in smartcard chip manufacture", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "4--4", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80018-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800181", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Girard:1999:NSIb, author = "Pierre Girard and Jean-Louis Lanet", title = "New security issues raised by open cards", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "4--5", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80019-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800193", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Kuhn:1999:PSSb, author = "Markus Kuhn", title = "Physical security of smartcards", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "5--5", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80020-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279980020X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Cherrill:1999:SCb, author = "David Cherrill", title = "Smartcard certification", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "5--6", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80021-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800211", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ward:1999:EISb, author = "Mike Ward", title = "{EMV} --- the {ICC} specifications for payment systems", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "6--6", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80022-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800223", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ayer:1999:MSR, author = "Ken Ayer", title = "Mitigating smartcard risks", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "6--7", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80023-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800235", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Beric:1999:MSSb, author = "John Beric", title = "{Mondex} security strategy", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "7--7", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80024-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800247", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Markantonakis:1999:ISAb, author = "Constantinos Markantonakis", title = "Interfacing with smartcard applications. ({The OpenCard Framework} and {PC\slash SC})", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "7--8", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80025-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800259", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Shawe-Taylor:1999:DFMc, author = "John Shawe-Taylor and Keith Howker and Peter Burge", title = "Detection of fraud in mobile telecommunications", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "8--9", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80026-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800260", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Roelofsen:1999:CATb, author = "Gert Roelofsen", title = "Cryptographic algorithms in telecommunications systems", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "9--10", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80027-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800272", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Collins:1999:HSTb, author = "Simon Collins", title = "How secure are telecoms internetwork communications?", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "10--11", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80028-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800284", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Johnston:1999:SISb, author = "Thomas F. Johnston", title = "Security issues in a satellite global {GSM} network", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "11--12", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80029-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800296", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Walker:1999:DTSb, author = "Michael Walker", title = "The direction of telecommunications security", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "12--13", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80030-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800302", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Venables:1999:SMH, author = "Phil Venables", title = "Security monitoring in heterogeneous globally distributed environments", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "13--13", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80031-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800314", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schepers:1999:NVH, author = "Filip Schepers", title = "Network-versus host-based intrusion detection", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "13--14", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80032-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800326", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pittaway:1999:DSSa, author = "Glenn Pittaway", title = "Distributed security services in {Microsoft Windows 2000} ({Windows NT 5.0}) --- protecting data in the enterprise", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "14--15", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80033-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800338", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ranum:1999:IGT, author = "M. J. Ranum and K. Landfield and M. Stolarchuk and M. Sienkiewicz and A. Lambeth and E. Wall", title = "Implementing a generalized tool for network monitoring", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "15--16", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80034-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279980034X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{McNamara:1999:NWD, author = "Roy McNamara", title = "Networks --- where does the real threat lie?", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "16--16", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80035-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800351", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bates:1999:FCF, author = "Jim Bates", title = "Fundamentals of computer forensics", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "16--17", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80036-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800363", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Barker:1999:VIM, author = "Robin Barker and Gavin Kelly", title = "The vulnerability instantiation methodology prototype", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "17--17", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80037-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800375", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hayday:1999:WNS, author = "John Hayday", title = "{Windows NT} security architecture", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "17--18", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80038-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800387", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hayday:1999:WNR, author = "John Hayday", title = "{Windows NT} --- Remote access", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "18--19", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80039-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800399", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{White:1999:DWN, author = "Ian White", title = "Developing a {Windows NT} security policy", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "19--20", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80040-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800405", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Wiseman:1999:ASL, author = "Simon Wiseman", title = "Adding security labelling to windows {NT}", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "20--20", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80041-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800417", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pittaway:1999:DSSb, author = "Glenn Pittaway", title = "Distributed security services in {Microsoft Windows NT 5.0} --- {Kerberos} and the active directory", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "20--21", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80042-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800429", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Brundrett:1999:KAW, author = "Peter Brundrett", title = "{Kerberos} authentication in {Windows NT 5.0} domains", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "21--22", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80043-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800430", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Khan:1999:DPK, author = "Liaquat Khan", title = "Deploying public key infrastructures", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "22--23", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80044-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800442", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Zaba:1999:TPC, author = "Stefek Zaba", title = "Tools and protocols for E-commerce", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "23--23", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80045-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800454", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Stirland:1999:SSE, author = "Mark Stirland", title = "Smartcards in secure electronic commerce", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "23--24", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80046-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800466", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Landrock:1999:WWY, author = "Peter Landrock and Torben Pedersen", title = "{WYSIWYS}? --- {What} you see is what you sign?", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "24--25", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80047-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800478", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Gollmann:1999:SCB, author = "Dieter Gollmann and Ulrich Lang", title = "Security in {CORBA}-based electronic commerce systems", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "25--25", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80048-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279980048X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Aldhouse:1999:DPE, author = "Francis Aldhouse", title = "Data protection and electronic commerce", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "25--26", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80049-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800491", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Markantonakis:1999:JCT, author = "Constantinos Markantonakis", title = "{Java} card technology and security", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "26--27", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80050-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800508", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dennis:1999:PKN, author = "Keith R. Dennis", title = "Public key network infrastructure. ({An} evolutionary step in the {Ascent of WAN})", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "27--27", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80051-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279980051X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dosdale:1999:ES, author = "T. Dosdale and C. N. Rasmussen", title = "{EDI} security", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "27--28", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80052-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800521", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Markowitz:1999:SR, author = "Judith A. Markowitz", title = "Speaker recognition", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "28--28", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80053-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800533", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{OGorman:1999:OFV, author = "Lawrence O'Gorman", title = "An overview of fingerprint verification technologies", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "28--29", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80054-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800545", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Daugman:1999:RPT, author = "John Daugman", title = "Recognizing people by their iris patterns", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "29--29", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80055-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800557", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pampus:1999:FRO, author = "Juergen Pampus and Frank Weber", title = "Facial recognition --- an overview", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "29--29", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80056-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800569", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sweeney:1999:VTP, author = "Eugene Sweeney", title = "{Veincheck} --- a technical perspective", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "29--30", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80057-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800570", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Fairhurst:1999:NPA, author = "M. C. Fairhurst", title = "New perspectives in automatic signature verification", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "30--30", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80058-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800582", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Carter:1999:IIB, author = "Bob Carter", title = "Implementation implications of biometrics", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "30--30", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80059-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800594", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mansfield:1999:MCP, author = "Tony Mansfield and Gavin Kelly", title = "Measuring and comparing the performance of biometric systems", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "30--31", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80060-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800600", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Rejman-Greene:1999:SCU, author = "Marek Rejman-Greene", title = "Security considerations in the use of biometric devices", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "31--31", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80061-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800612", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Chandler:1999:CVR, author = "Ian Chandler", title = "Cardholder verification realities at point-of-sale", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "31--32", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80062-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800624", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Thomas:1999:WCA, author = "Stephen Thomas", title = "Will commercial applications for biometric-based solutions really take off in 1998?", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "32--32", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80063-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800636", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Davies:1999:BCL, author = "Simon Davies", title = "Biometrics --- a civil liberties and privacy perspective", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "32--32", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80064-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800648", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hawkes:1999:BTL, author = "Peter Hawkes", title = "Biometrics and {Turing}'s legacy", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "32--33", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80065-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341279980065X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:TCUa, author = "Anonymous", title = "Technical cryptography update --- {Part 2} (volume 2, number 4)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "33--33", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80066-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800661", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:NSV, author = "Anonymous", title = "Network security (volume 2, number 3)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "33--33", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80067-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800673", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:TCUb, author = "Anonymous", title = "Technical cryptography update (volume 2, number 2)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "33--33", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80068-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800685", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:RIS, author = "Anonymous", title = "Regulation in information security (volume 2, number 1)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "33--33", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80069-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800697", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:OVN, author = "Anonymous", title = "Outsourcing (volume 1, number 3)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "33--34", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80070-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800703", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:DSS, author = "Anonymous", title = "Distributed systems security (volume 1, number 2)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "34--34", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80071-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800715", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:1999:TTP, author = "Anonymous", title = "Trusted third parties (volume 1, number 1)", journal = j-INFO-SEC-TECH-REP, volume = "4", number = "S1", pages = "34--34", month = "????", year = "1999", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(99)80072-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:25 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412799800727", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2000:PJa, author = "Anonymous", title = "Pages 1--82 (1 {January} 2000)", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "1", pages = "??--??", day = "1", month = jan, year = "2000", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:26 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2000:I, author = "Anonymous", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "1", pages = "1--1", day = "1", month = jan, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)87625-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:26 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700876256", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2000:RHa, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "1", pages = "3--13", day = "1", month = jan, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)87626-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:26 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700876268", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mason:2000:PSC, author = "Tony Mason", title = "Platform Security and Common Criteria", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "1", pages = "14--25", day = "1", month = jan, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)87627-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:26 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270087627X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schell:2000:PSW, author = "Roger R. Schell and Michael F. Thompson", title = "Platform Security: What is Lacking?", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "1", pages = "26--41", day = "1", month = jan, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)87628-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:26 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700876281", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Stone:2000:HSM, author = "Tim D. Stone and David Miller", title = "High Security Modules --- Still Needed Despite Advances in Platforms", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "1", pages = "42--47", day = "1", month = jan, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)87629-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:26 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700876293", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bohm:2000:HSD, author = "Nicholas Bohm", title = "How Strong do Platforms Need to be From a Legal Perspective?", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "1", pages = "48--53", day = "1", month = jan, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)87630-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:26 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270087630X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Balacheff:2000:CPS, author = "Boris Balacheff and Liqun Chen and Siani Pearson and Graeme Proudler and David Chan", title = "Computing Platform Security in Cyberspace", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "1", pages = "54--63", day = "1", month = jan, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)87631-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:26 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700876311", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Phillips:2000:WSB, author = "Ivan Phillips", title = "{Windows 2000} Security: a Balanced View", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "1", pages = "64--82", day = "1", month = jan, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)87632-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:26 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700876323", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2000:PJb, author = "Anonymous", title = "Pages 1--70 (1 {June} 2000)", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "2", pages = "??--??", day = "1", month = jun, year = "2000", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2000:Ia, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "2", pages = "1--1", day = "1", month = jun, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)02001-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270002001X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2000:RHb, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "2", pages = "3--14", day = "1", month = jun, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)02002-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700020021", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bates:2000:CER, author = "T. J. Bates", title = "Computer Evidence --- Recent Issues", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "2", pages = "15--22", day = "1", month = jun, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)02003-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700020033", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Yapp:2000:WBY, author = "Peter Yapp", title = "{Who}'s Bugging You? How Are You Protecting Your Information?", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "2", pages = "23--33", day = "1", month = jun, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)02004-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700020045", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Blake:2000:PS, author = "Vincent Blake", title = "{PABX} Security", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "2", pages = "34--42", day = "1", month = jun, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)02005-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700020057", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Janes:2000:RTC, author = "Simon Janes", title = "The Role of Technology in Computer Forensic Investigations", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "2", pages = "43--50", day = "1", month = jun, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)02006-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700020069", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Highfield:2000:CMA, author = "Malcolm Highfield", title = "The {Computer Misuse Act 1990}: Understanding and Applying the Law", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "2", pages = "51--59", day = "1", month = jun, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)02007-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700020070", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dippel:2000:IEC, author = "Tad Dippel", title = "{IT} as an Enabler of Computer Fraud", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "2", pages = "60--70", day = "1", month = jun, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)02008-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700020082", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2000:PS, author = "Anonymous", title = "Pages 1--82 (1 {September} 2000)", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "3", pages = "??--??", day = "1", month = sep, year = "2000", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2000:Ib, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "3", pages = "1--1", day = "1", month = sep, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)03001-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700030016", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2000:RHc, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "3", pages = "3--14", day = "1", month = sep, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)03002-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700030028", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bakalov:2000:IWW, author = "Rudy Bakalov", title = "Introduction to {WAP}'s {Wireless Transport Layer Security}", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "3", pages = "15--22", day = "1", month = sep, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)03003-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270003003X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Farrell:2000:WFW, author = "Stephen Farrell", title = "The {WAP Forum}'s Wireless {Public Key Infrastructure}", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "3", pages = "23--31", day = "1", month = sep, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)03004-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700030041", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Persson:2000:BSO, author = "Joakim Persson and Ben Smeets", title = "{Bluetooth} Security --- an Overview", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "3", pages = "32--43", day = "1", month = sep, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)03005-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700030053", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Roelofsen:2000:TS, author = "Gert Roelofsen", title = "{TETRA} Security", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "3", pages = "44--54", day = "1", month = sep, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)03006-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700030065", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Blanchard:2000:STG, author = "Colin Blanchard", title = "Security for the Third Generation {(3G)} Mobile System", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "3", pages = "55--65", day = "1", month = sep, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)03007-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700030077", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Babbage:2000:DSA, author = "Steve Babbage", title = "Design of Security Algorithms for Third Generation Mobile Telephony", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "3", pages = "66--73", day = "1", month = sep, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)03008-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700030089", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Cadzow:2000:SCI, author = "Scott Cadzow", title = "Security Concerns in {IP}-Based Telephony: Covering {TIPHON} as a Case Study", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "3", pages = "74--82", day = "1", month = sep, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)03009-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700030090", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2000:PD, author = "Anonymous", title = "Pages 1--89 (1 {December} 2000)", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "4", pages = "??--??", day = "1", month = dec, year = "2000", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2000:Ic, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "4", pages = "1--2", day = "1", month = dec, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)04001-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700040012", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2000:RHd, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "4", pages = "3--16", day = "1", month = dec, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)04002-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700040024", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mitchell:2000:PS, author = "Chris Mitchell", title = "{PKI} standards", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "4", pages = "17--32", day = "1", month = dec, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)04003-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700040036", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bickmore:2000:IP, author = "Robert Bickmore and Baltimore Technologies", title = "Implementing a {PKI}", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "4", pages = "33--38", day = "1", month = dec, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)04004-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700040048", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Carolina:2000:IPK, author = "Robert Carolina and Jamie Lyford and Tarlo Lyons", title = "The Intersection of {Public Key Infrastructures} and the Law", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "4", pages = "39--52", day = "1", month = dec, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)04005-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270004005X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sundt:2000:PPS, author = "Chris Sundt", title = "{PKI} --- Panacea or Silver Bullet?", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "4", pages = "53--65", day = "1", month = dec, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)04006-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700040061", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Matthews:2000:AMP, author = "Steve Matthews", title = "Authorization Models --- {PKI} Versus the Real World", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "4", pages = "66--71", day = "1", month = dec, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)04007-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700040073", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sedov:2000:CC, author = "Vivike Sedov", title = "Certificate Classes", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "4", pages = "72--80", day = "1", month = dec, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)04008-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700040085", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bullard:2000:ACA, author = "John Bullard", title = "Achieving Certainty in an Age of Uncertainty", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "4", pages = "81--83", day = "1", month = dec, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)04009-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700040097", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Stirland:2000:ILT, author = "Mark Stirland", title = "{Identrus} --- the `Technical Platform'", journal = j-INFO-SEC-TECH-REP, volume = "5", number = "4", pages = "84--89", day = "1", month = dec, year = "2000", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(00)04010-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:27 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412700040103", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2001:PM, author = "Anonymous", title = "Pages 1--94 (1 {March} 2001)", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "1", pages = "??--??", day = "1", month = mar, year = "2001", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2001:Ia, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "1", pages = "1--1", day = "1", month = mar, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00101-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701001017", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2001:RHa, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "1", pages = "3--14", day = "1", month = mar, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00102-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701001029", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Gentry:2001:WV, author = "Perry B. Gentry", title = "What is a {VPN}?", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "1", pages = "15--22", day = "1", month = mar, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00103-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701001030", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Broderick:2001:IVP, author = "J. S. Broderick", title = "Implementing Virtual Private Networks in Today's Organization", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "1", pages = "23--30", day = "1", month = mar, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00104-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701001042", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Broderick:2001:VSP, author = "J. S. Broderick", title = "{VPN} Security Policy", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "1", pages = "31--34", day = "1", month = mar, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00105-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701001054", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dunbar:2001:INS, author = "Neil Dunbar", title = "{IPsec} Networking Standards --- an Overview", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "1", pages = "35--48", day = "1", month = mar, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00106-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701001066", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Donovan:2001:VLC, author = "Samantha Donovan and Peter Drabwell and Rae Harbird", title = "{VPNs} and Lightweight Clients", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "1", pages = "49--64", day = "1", month = mar, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00107-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701001078", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Box:2001:EUV, author = "William Box and Keith Sterling", title = "Enabling the User: the {VPN} in Context", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "1", pages = "65--76", day = "1", month = mar, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00108-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270100108X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schafer:2001:PIW, author = "Georgina Sch{\"a}fer", title = "Placement of Intelligence Within Networks to Provide Corporate {VPN} Services", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "1", pages = "77--94", day = "1", month = mar, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00109-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701001091", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2001:PJ, author = "Anonymous", title = "Pages 1--102 (1 {June} 2001)", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "2", pages = "??--??", day = "1", month = jun, year = "2001", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2001:Ib, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "2", pages = "1--1", day = "1", month = jun, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00201-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701002011", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2001:RHb, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "2", pages = "3--11", day = "1", month = jun, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00202-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701002023", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Lothian:2001:DSW, author = "Paul Lothian and Peter Wenham", title = "Database Security in a {Web} Environment", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "2", pages = "12--20", day = "1", month = jun, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00203-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701002035", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bellettini:2001:RBA, author = "Carlo Bellettini and Elisa Bertino and Elena Ferrari", title = "Role Based Access Control Models", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "2", pages = "21--29", day = "1", month = jun, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00204-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701002047", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Wiseman:2001:DSR, author = "Simon Wiseman", title = "Database Security: Retrospective and Way Forward", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "2", pages = "30--43", day = "1", month = jun, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00205-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701002059", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bertino:2001:XS, author = "Elisa Bertino and Barbara Carminati and Elena Ferrari", title = "{XML} security", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "2", pages = "44--58", day = "1", month = jun, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00206-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701002060", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Atluri:2001:SWS, author = "Vijay Atluri", title = "Security for Workflow Systems", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "2", pages = "59--68", day = "1", month = jun, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00207-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701002072", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Jajodia:2001:SFD, author = "Sushil Jajodia and Duminda Wijesekera", title = "Security in Federated Database Systems", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "2", pages = "69--79", day = "1", month = jun, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00208-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701002084", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Davidson:2001:SE, author = "Mary Ann Davidson", title = "Security for {eBusiness}", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "2", pages = "80--94", day = "1", month = jun, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00209-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701002096", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Thuraisingham:2001:SDD, author = "Bhavani Thuraisingham", title = "Security for Distributed Databases", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "2", pages = "95--102", day = "1", month = jun, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00210-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701002102", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2001:PS, author = "Anonymous", title = "Pages 1--70 ({1 September 2001})", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "3", pages = "??--??", day = "1", month = sep, year = "2001", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2001:Ic, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "3", pages = "1--1", day = "1", month = sep, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00301-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701003016", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2001:RHc, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "3", pages = "3--11", day = "1", month = sep, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00302-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701003028", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Broderick:2001:ISR, author = "J. S. Broderick", title = "Information Security Risk Management --- When Should It be Managed?", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "3", pages = "12--18", day = "1", month = sep, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00303-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270100303X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Tregear:2001:RA, author = "Jonathan Tregear", title = "Risk Assessment", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "3", pages = "19--27", day = "1", month = sep, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00304-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701003041", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Navarro:2001:ISR, author = "Luis Navarro", title = "Information Security Risks and Managed Security Service", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "3", pages = "28--36", day = "1", month = sep, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00305-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701003053", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Janczewski:2001:HDD, author = "Lech J. Janczewski", title = "Handling Distributed Denial-of-Service Attacks", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "3", pages = "37--44", day = "1", month = sep, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00306-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701003065", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dodson:2001:IIM, author = "Rob Dodson", title = "Information Incident Management", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "3", pages = "45--53", day = "1", month = sep, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00307-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701003077", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Teneyuca:2001:OLU, author = "David Teneyuca", title = "Organizational {Leader}'s Use Of Risk Management for Information Technology", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "3", pages = "54--59", day = "1", month = sep, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00308-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701003089", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Williams:2001:ISG, author = "Paul Williams", title = "Information Security Governance", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "3", pages = "60--70", day = "1", month = sep, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00309-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:28 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701003090", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2001:PD, author = "Anonymous", title = "Pages 1--82 (1 {December} 2001)", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "4", pages = "??--??", day = "1", month = dec, year = "2001", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2001:Id, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "4", pages = "1--1", day = "1", month = dec, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00401-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701004010", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2001:RHd, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "4", pages = "3--11", day = "1", month = dec, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00402-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701004022", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Nikishin:2001:RA, author = "Andy Nikishin", title = "Red Alert", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "4", pages = "12--17", day = "1", month = dec, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00403-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701004034", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Muttik:2001:PCT, author = "Igor G. Muttik", title = "Pick'n'mix comparative tests.", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "4", pages = "18--30", day = "1", month = dec, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00404-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701004046", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2001:BTH, author = "Anonymous", title = "Backdoors and {Trojan} Horses: By the {Internet Security Systems}' {X-Force}", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "4", pages = "31--57", day = "1", month = dec, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00405-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701004058", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Rautiainen:2001:TLM, author = "Sami Rautiainen", title = "Travelling with {Linux} malware: Is {Linux} security for real?", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "4", pages = "58--64", day = "1", month = dec, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00406-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib; http://www.math.utah.edu/pub/tex/bib/linux.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270100406X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Tocheva:2001:WFS, author = "Katrin Tocheva", title = "{Worm}'s Fashion Salon", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "4", pages = "65--78", day = "1", month = dec, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00407-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701004071", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Gordon:2001:VWR, author = "Sarah Gordon", title = "The Virus Writer and The Reporter", journal = j-INFO-SEC-TECH-REP, volume = "6", number = "4", pages = "79--82", day = "1", month = dec, year = "2001", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(01)00408-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412701004083", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:PM, author = "Anonymous", title = "Pages 1--78 (31 {March} 2002)", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "1", pages = "??--??", day = "31", month = mar, year = "2002", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2002:Ia, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "1", pages = "1--1", day = "31", month = mar, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00101-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702001012", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:RHa, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "1", pages = "3--10", day = "31", month = mar, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00102-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702001024", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mellander:2002:UFS, author = "Jim Mellander", title = "{Unix} Filesystem Security", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "1", pages = "11--25", day = "31", month = mar, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00103-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702001036", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Steinberger:2002:VMU, author = "Richard Steinberger", title = "Vulnerability Management in {Unix} Environments", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "1", pages = "26--36", day = "31", month = mar, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00104-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702001048", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dalton:2002:DSU, author = "C. I. Dalton and T. H. Choo and A. P. Norman", title = "Design of {Secure Unix}", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "1", pages = "37--56", day = "31", month = mar, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00105-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270200105X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Boeckman:2002:SSI, author = "Chuck Boeckman", title = "Securing the {Shell} --- Implementing a Host Level Default Deny Policy", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "1", pages = "57--62", day = "31", month = mar, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00106-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702001061", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Guel:2002:FCY, author = "Michele D. Guel", title = "A Framework for Choosing Your Next Generation Authentication\slash Authorization System", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "1", pages = "63--78", day = "31", month = mar, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00107-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702001073", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:PJ, author = "Anonymous", title = "Pages 1--74 (1 {June} 2002)", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "2", pages = "??--??", day = "1", month = jun, year = "2002", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2002:Ib, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "2", pages = "1--1", day = "1", month = jun, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)02001-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702020010", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:RHb, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "2", pages = "3--10", day = "1", month = jun, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)02002-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702020022", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Desmedt:2002:TNS, author = "Yvo Desmedt", title = "Is there a Need for Survivable Computation in Critical Infrastructures?", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "2", pages = "11--21", day = "1", month = jun, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)02003-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702020034", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Jones:2002:PCN, author = "Andy Jones", title = "Protecting the Critical National Infrastructure --- Developing a Method for the Measurement of Threat Agents in an Information Environment", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "2", pages = "22--36", day = "1", month = jun, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)02004-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702020046", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Todd:2002:BCI, author = "Mike Todd and Carl Colwill and Dave Allen", title = "Benchmarking for Critical Infrastructure Protection", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "2", pages = "37--49", day = "1", month = jun, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)02005-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702020058", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Rak:2002:ISC, author = "Adam Rak", title = "Information Sharing in the {Cyber Age}: a Key to Critical Infrastructure Protection", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "2", pages = "50--56", day = "1", month = jun, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)02006-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270202006X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Branigan:2002:SCI, author = "Steven Branigan", title = "Securing the Critical {IP} Infrastructure", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "2", pages = "57--64", day = "1", month = jun, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)02007-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702020071", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Whittaker:2002:UFS, author = "Colin Whittaker", title = "The {UK} Financial Sector's Place in the Critical National Infrastructure", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "2", pages = "65--74", day = "1", month = jun, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)02008-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:29 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702020083", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:PS, author = "Anonymous", title = "Pages 1--94 ({September 2002})", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "3", pages = "??--??", month = sep, year = "2002", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:I, author = "Anonymous", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "3", pages = "1--1", month = sep, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00301-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702003011", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:RHc, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "3", pages = "3--11", month = sep, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00302-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702003023", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:IAE, author = "Anonymous", title = "Identity and Authentication in the E-economy", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "3", pages = "12--19", month = sep, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00303-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702003035", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:SCA, author = "Anonymous", title = "Smart Cards and the Associated Infrastructure Problem", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "3", pages = "20--29", month = sep, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00304-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702003047", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:SAU, author = "Anonymous", title = "Secure Authentication Using Biometric Methods", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "3", pages = "30--40", month = sep, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00305-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702003059", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:CPS, author = "Anonymous", title = "Cryptography from Pairings: a Snapshot of Current Research", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "3", pages = "41--54", month = sep, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00306-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702003060", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:DOF, author = "Anonymous", title = "The Development of Open, Federated Specifications for Network Identity", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "3", pages = "55--64", month = sep, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00307-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702003072", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:AOI, author = "Anonymous", title = "Addressing Online Identity: Understanding the {Microsoft Passport Service}", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "3", pages = "65--80", month = sep, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00308-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702003084", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:SAM, author = "Anonymous", title = "Secure Access Management: Trends, Drivers and Solutions", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "3", pages = "81--94", month = sep, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00309-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702003096", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:PD, author = "Anonymous", title = "Pages 1--62 ({December 2002})", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "4", pages = "??--??", month = dec, year = "2002", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2002:Ic, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "4", pages = "1--1", month = dec, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00401-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702004016", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2002:RHd, author = "Anonymous", title = "Report Highlights", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "4", pages = "3--9", month = dec, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00402-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702004028", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Flink:2002:WHK, author = "Yona Flink", title = "Who holds the key to {IT} security?", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "4", pages = "10--22", month = dec, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00403-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270200403X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Nixon:2002:NAA, author = "Mark S. Nixon and John N. Carter and Jamie D. Shutler and Michael G. Grant", title = "New Advances in Automatic Gait Recognition", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "4", pages = "23--35", month = dec, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00404-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702004041", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Tilton:2002:BSO, author = "Catherine J. Tilton", title = "Biometric Standards --- an Overview", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "4", pages = "36--48", month = dec, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00405-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702004053", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Soutar:2002:IBS, author = "Colin Soutar", title = "Implementation of Biometric Systems --- Security and Privacy Considerations", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "4", pages = "49--55", month = dec, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00406-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702004065", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schuckers:2002:SAS, author = "Stephanie A. C. Schuckers", title = "Spoofing and Anti-Spoofing Measures", journal = j-INFO-SEC-TECH-REP, volume = "7", number = "4", pages = "56--62", month = dec, year = "2002", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(02)00407-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412702004077", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:PM, author = "Anonymous", title = "Pages 5--84 ({March 2003})", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "1", pages = "??--??", month = mar, year = "2003", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciehanowicz:2003:I, author = "Chez Ciehanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "1", pages = "5--5", month = mar, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00101-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703001018", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mayes:2003:WSA, author = "Keith Mayes and Konstantinos Markantonakis", title = "Are we smart about security?", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "1", pages = "6--16", month = mar, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00102-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270300102X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Markantonakis:2003:OGS, author = "Konstantinos Markantonakis and Keith Mayes", title = "An overview of the {GlobalPlatform} smart card specification", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "1", pages = "17--29", month = mar, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00103-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703001031", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Page:2003:DAC, author = "D. Page", title = "Defending against cache-based side-channel attacks", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "1", pages = "30--44", month = mar, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00104-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703001043", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Aebi:2003:SSL, author = "Paul Aebi and Rudolf Oswald", title = "Secure {SIM} lifecycle management", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "1", pages = "45--54", month = mar, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00105-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703001055", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Girard:2003:SAS, author = "Pierre Girard and Jean-Luc Giraud", title = "Software attacks on smart cards", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "1", pages = "55--66", month = mar, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00106-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703001067", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Rankl:2003:OAA, author = "Wolfgang Rankl", title = "Overview about attacks on smart cards", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "1", pages = "67--84", month = mar, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00107-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:30 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703001079", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:PJa, author = "Anonymous", title = "Pages 5--64 ({June 2003})", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "2", pages = "??--??", month = jun, year = "2003", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2003:Ia, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "2", pages = "5--5", month = jun, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00201-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703002012", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:FAL, author = "Anonymous", title = "Forensic analysis on a {Lotus Notes} server", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "2", pages = "6--17", month = jun, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00202-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703002024", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:ADP, author = "Anonymous", title = "Addressing the data problem", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "2", pages = "18--31", month = jun, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00203-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703002036", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:CFP, author = "Anonymous", title = "Computer forensics: past, present and future", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "2", pages = "32--36", month = jun, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00204-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703002048", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:SSS, author = "Anonymous", title = "Some stepping stones in computer forensics", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "2", pages = "37--41", month = jun, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00205-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270300205X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:CAD, author = "Anonymous", title = "A comprehensive approach to digital incident investigation", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "2", pages = "42--54", month = jun, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00206-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703002061", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:MSI, author = "Anonymous", title = "Management strategies for implementing forensic security measures", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "2", pages = "55--64", month = jun, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00207-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703002073", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:PJb, author = "Anonymous", title = "Pages 1--88 (9 {July} 2003)", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "3", pages = "??--??", day = "9", month = jul, year = "2003", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Piper:2003:I, author = "Fred Piper and Geraint Price and Kenny Paterson", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "3", pages = "5--5", day = "9", month = jul, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00301-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703003017", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:PNG, author = "Anonymous", title = "{PKI} needs good standards?", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "3", pages = "6--13", day = "9", month = jul, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00302-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703003029", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:CPC, author = "Anonymous", title = "Certificate policies and certification practice statements --- a practical approach", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "3", pages = "14--22", day = "9", month = jul, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00303-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703003030", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Emery:2003:TVA, author = "Dick Emery and Stephen Upton and Richard Trevorah", title = "{{\em tScheme}} --- voluntary approval for certificate authority services", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "3", pages = "23--35", day = "9", month = jul, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00304-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703003042", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Jaweed:2003:CTE, author = "Semia Jaweed", title = "Could there ever be a unitary digital certificate?", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "3", pages = "36--44", day = "9", month = jul, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00305-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703003054", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:DCV, author = "Anonymous", title = "Delegated Certificate Validation:: a new approach to simplifying {PKI} and achieving trust interoperability", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "3", pages = "45--52", day = "9", month = jul, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00306-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703003066", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:IPF, author = "Anonymous", title = "{ID-PKC}: a fresh approach to public key cryptography", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "3", pages = "53--56", day = "9", month = jul, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00307-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703003078", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Paterson:2003:CBT, author = "Kenneth G. Paterson and Geraint Price", title = "A comparison between traditional public key infrastructures and identity-based cryptography", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "3", pages = "57--72", day = "9", month = jul, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00308-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270300308X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dalton:2003:NPG, author = "Chris R. Dalton", title = "The {NHS} as a proving ground for cryptosystems", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "3", pages = "73--88", day = "9", month = jul, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00309-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703003091", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2003:PA, author = "Anonymous", title = "Pages 5--84 ({April 2003})", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "4", pages = "??--??", month = apr, year = "2003", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2003:Ib, author = "Chez Ciechanowicz", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "4", pages = "5--5", month = apr, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00001-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703000013", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Gunara-Chen:2003:AIT, author = "Glenn Gunara-Chen", title = "The art of intrusion testing", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "4", pages = "6--13", month = apr, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00002-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703000025", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Blyth:2003:XBA, author = "Andrew Blyth", title = "An {XML}-based architecture to perform data integration and data unification in vulnerability assessments", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "4", pages = "14--25", month = apr, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00003-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703000037", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Eschelbeck:2003:ENI, author = "Gerhard Eschelbeck and Michael Krieger", title = "Eliminating noise from intrusion detection systems", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "4", pages = "26--33", month = apr, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00004-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703000049", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Gray:2003:HPS, author = "Andy Gray", title = "An historical perspective of software vulnerability management", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "4", pages = "34--44", month = apr, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00005-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703000050", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Morakis:2003:MVT, author = "Evangelos Morakis and Stylianos Vidalis and Andrew Blyth", title = "Measuring vulnerabilities and their exploitation cycle", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "4", pages = "45--55", month = apr, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00006-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703000062", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Barrett:2003:PTS, author = "Neil Barrett", title = "Penetration testing and social engineering: Hacking the weakest link", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "4", pages = "56--64", month = apr, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00007-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703000074", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Midian:2003:HEE, author = "Paul Midian", title = "How to ensure an effective penetration test", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "4", pages = "65--77", month = apr, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00008-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703000086", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mollerhaug:2003:UVA, author = "Stein Mollerhaug", title = "Useful vulnerability assessment", journal = j-INFO-SEC-TECH-REP, volume = "8", number = "4", pages = "78--84", month = apr, year = "2003", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(03)00009-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:31 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412703000098", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2022:PJM, author = "Anonymous", title = "Pages 5--96 ({January--March 2004})", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "1", pages = "??--??", month = "????", year = "2022", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schwiderski-Grosche:2022:I, author = "Scarlet Schwiderski-Grosche", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "1", pages = "5--5", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00010-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270400010X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Small:2022:BTM, author = "Mike Small", title = "Business and technical motivation for identity management", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "1", pages = "6--21", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00011-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000111", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Brown:2022:UHT, author = "Geoff Brown", title = "The use of hardware tokens for identity management", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "1", pages = "22--25", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00012-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000123", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Oppliger:2022:MNP, author = "Rolf Oppliger", title = "{Microsoft .NET Passport} and identity management", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "1", pages = "26--34", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00013-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000135", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hansen:2022:PEI, author = "Marit Hansen and Peter Berlich and Jan Camenisch and Sebastian Clau{\ss} and Andreas Pfitzmann and Michael Waidner", title = "Privacy-enhancing identity management", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "1", pages = "35--44", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00014-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000147", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pfitzmann:2022:PEI, author = "Birgit Pfitzmann", title = "Privacy in enterprise identity federation --- policies for {Liberty 2} single sign on", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "1", pages = "45--58", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00015-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000159", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Demchenko:2022:VOC, author = "Yuri Demchenko", title = "Virtual organisations in computer grids and identity management", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "1", pages = "59--76", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00016-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000160", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Rannenberg:2022:IMM, author = "Kai Rannenberg", title = "Identity management in mobile cellular networks and related applications", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "1", pages = "77--85", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00017-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000172", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sodhi:2022:UPS, author = "Gavenraj Sodhi", title = "User provisioning with {SPML}", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "1", pages = "86--96", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00018-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000184", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2022:PAJ, author = "Anonymous", title = "Pages 5--75 ({April--June 2004})", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "2", pages = "??--??", month = "????", year = "2022", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ganley:2022:I, author = "Michael Ganley", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "2", pages = "5--5", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00019-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000196", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Nikishin:2022:MSP, author = "Andrey Nikishin", title = "Malicious software --- past, present and future", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "2", pages = "6--18", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00020-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000202", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ford:2022:FVD, author = "Richard Ford", title = "The future of virus detection", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "2", pages = "19--26", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00021-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000214", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Williamson:2022:DMW, author = "David Williamson", title = "Deconstructing malware: what it is and how to stop it", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "2", pages = "27--34", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00022-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000226", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Stewart:2022:BM, author = "Joe Stewart", title = "This business of malware", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "2", pages = "35--41", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00023-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000238", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Rautiainen:2022:SS, author = "Sami Rautiainen", title = "Sound of silence", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "2", pages = "42--46", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00024-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270400024X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Heiser:2022:UTM, author = "Jay G. Heiser", title = "Understanding today's malware", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "2", pages = "47--64", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00025-1", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000251", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Fothergill:2022:BIR, author = "Shaun Fothergill", title = "Business issues relating to malware", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "2", pages = "65--75", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00026-3", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:32 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000263", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2022:PJS, author = "Anonymous", title = "Pages 5--76 ({July--September 2004})", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "3", pages = "??--??", month = "????", year = "2022", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Crampton:2022:I, author = "Jason Crampton", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "3", pages = "5--5", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00027-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000275", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Lautenbach:2022:IXE, author = "Berin Lautenbach", title = "Introduction to {XML Encryption} and {XML Signature}", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "3", pages = "6--18", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00028-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000287", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bertino:2022:ACX, author = "Elisa Bertino and Barbara Carminati and Elena Ferrari", title = "Access control for {XML} documents and data", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "3", pages = "19--34", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00029-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000299", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ardagna:2022:XBA, author = "C. A. Ardagna and E. Damiani and S. {De Capitani di Vimercati} and P. Samarati", title = "{XML}-based access control languages", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "3", pages = "35--46", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00030-5", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000305", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Iannella:2022:ODR, author = "Renato Iannella", title = "The {Open Digital Rights Language}: {XML} for Digital Rights Management", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "3", pages = "47--55", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00031-7", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000317", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Madsen:2022:FIW, author = "Paul Madsen", title = "Federated identity and web services", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "3", pages = "56--65", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00032-9", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000329", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Michalek:2022:DAS, author = "Peter Michalek", title = "Dissecting application security {XML} schemas: {AVDL}, {WAS}, {OVAL} --- state of the {XML} security standards report", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "3", pages = "66--76", month = "????", year = "2022", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(04)00033-0", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000330", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2004:PD, author = "Anonymous", title = "Pages 5--80 ({December 2004})", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "4", pages = "??--??", month = dec, year = "2004", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schwiderski-Grosche:2004:I, author = "Scarlet Schwiderski-Grosche", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "4", pages = "5--5", month = dec, year = "2004", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(05)70035-2", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705700352", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Walter:2004:SMB, author = "Thomas Walter and Laurent Bussard and Yves Roudier and Jochen Haller and Roger Kilian-Kehr and Joachim Posegga and Philip Robinson", title = "Secure mobile business applications --- framework, architecture and implementation", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "4", pages = "6--21", month = dec, year = "2004", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(05)70036-4", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705700364", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Irwin:2004:DRM, author = "James Irwin", title = "Digital Rights Management: the {Open Mobile Alliance DRM} specifications", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "4", pages = "22--31", month = dec, year = "2004", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(05)70037-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705700376", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Niemi:2004:TMS, author = "Valtteri Niemi", title = "Trends in mobile security standards", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "4", pages = "32--38", month = dec, year = "2004", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(05)70038-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705700388", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Knospe:2004:RS, author = "Heiko Knospe and Hartmut Pohl", title = "{RFID} security", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "4", pages = "39--50", month = dec, year = "2004", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(05)70039-X", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270570039X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Babb:2004:URS, author = "Derek Babb", title = "User requirements for security in wireless mobile systems", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "4", pages = "51--59", month = dec, year = "2004", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(05)70040-6", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705700406", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dodgson:2004:MTS, author = "Terence E. Dodgson", title = "Mobile terminal security and tracking", journal = j-INFO-SEC-TECH-REP, volume = "9", number = "4", pages = "60--80", month = dec, year = "2004", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/S1363-4127(05)70041-8", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705700418", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2005:Pa, author = "Anonymous", title = "Pages 1--58 (2005)", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "1", pages = "??--??", month = "????", year = "2005", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Crampton:2005:IFI, author = "Jason Crampton", title = "Introduction to {February 2005} issue of {ISTR}", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "1", pages = "1--1", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.02.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000075", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Beznosov:2005:IWS, author = "Konstantin Beznosov and Donald J. Flinn and Shirley Kawamoto and Bret Hartman", title = "Introduction to {Web} services and their security", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "1", pages = "2--14", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.02.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000063", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Geuer-Pollmann:2005:WSW, author = "Christian Geuer-Pollmann and Joris Claessens", title = "{Web} services and web service security standards", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "1", pages = "15--24", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2004.11.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000020", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{MacPhee:2005:NFI, author = "Allan MacPhee and Mark O'Neill", title = "Notes from the field: Implementing a security solution for {Web} Services", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "1", pages = "25--32", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.02.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000087", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Chadwick:2005:AGC, author = "David Chadwick", title = "Authorisation in Grid computing", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "1", pages = "33--40", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2004.11.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000056", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Kearney:2005:MLS, author = "Paul Kearney", title = "Message level security for web services", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "1", pages = "41--50", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2004.11.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000044", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Denker:2005:SSW, author = "Grit Denker and Lalana Kagal and Tim Finin", title = "Security in the {Semantic Web} using {OWL}", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "1", pages = "51--58", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2004.11.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:33 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412704000032", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2005:Pb, author = "Anonymous", title = "Pages 59--132 (2005)", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "2", pages = "??--??", month = "????", year = "2005", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Berger:2005:TCG, author = "Brian Berger", title = "Trusted computing group history", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "2", pages = "59--62", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.05.007", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000233", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Suh:2005:ASC, author = "G. Edward Suh and Charles W. O'Donnell and Srinivas Devadas", title = "{AEGIS}: a single-chip secure processor", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "2", pages = "63--73", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.05.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000208", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Safford:2005:TCO, author = "David Safford and Mimi Zohar", title = "Trusted computing and open source", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "2", pages = "74--82", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.05.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib; http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000191", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sadeghi:2005:TMS, author = "Ahmad-Reza Sadeghi and Christian St{\"u}ble", title = "Towards multilaterally secure computing platforms --- with open source and trusted computing", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "2", pages = "83--95", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.05.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib; http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000221", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Covey:2005:ATP, author = "Carlin Covey and Mark Redman and Thomas Tkacik", title = "An {Advanced Trusted Platform} for mobile phone devices", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "2", pages = "96--104", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.05.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270500021X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schoen:2005:CCC, author = "Seth Schoen", title = "Compatibility, competition, and control in trusted computing environments", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "2", pages = "105--119", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.05.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000245", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Strongin:2005:TCU, author = "Geoffrey Strongin", title = "Trusted computing using {AMD} {``Pacifica''} and {``Presidio''} secure virtual machine technology", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "2", pages = "120--132", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.05.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000257", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2005:Pc, author = "Anonymous", title = "Pages 133--184 (2005)", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "3", pages = "??--??", month = "????", year = "2005", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ganley:2005:IID, author = "Michael Ganley", title = "Introduction --- Intrusion detection and prevention", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "3", pages = "133--133", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.08.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000427", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Fuchsberger:2005:IDS, author = "Andreas Fuchsberger", title = "Intrusion Detection Systems and Intrusion Prevention Systems", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "3", pages = "134--139", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.08.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000415", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hernacki:2005:ONE, author = "Brian Hernacki and Jeremy Bennett and James Hoagland", title = "An overview of network evasion methods", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "3", pages = "140--149", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.07.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000397", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Papadaki:2005:IDP, author = "M. Papadaki and S. M. Furnell", title = "Informing the decision process in an automated intrusion response system", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "3", pages = "150--161", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.07.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000373", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sourcefire:2005:NGI, author = "{Sourcefire, Inc.}", title = "Next-generation intrusion prevention: Accounting for the attack timeline", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "3", pages = "162--168", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.08.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000403", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pietraszek:2005:DMM, author = "Tadeusz Pietraszek and Axel Tanner", title = "Data mining and machine learning --- Towards reducing false positives in intrusion detection", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "3", pages = "169--183", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.07.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000361", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2005:Pd, author = "Anonymous", title = "Pages 185--240 (2005)", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "4", pages = "??--??", month = "????", year = "2005", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Price:2005:ESP, author = "G. Price", title = "Editorial: {``The} security perimeter''", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "4", pages = "185--185", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.10.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000488", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Lacey:2005:IFV, author = "David Lacey", title = "Inventing the future --- The vision of the {Jericho Forum}", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "4", pages = "186--188", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.10.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000464", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Palmer:2005:PBL, author = "Graham Palmer", title = "De-Perimeterisation: Benefits and limitations", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "4", pages = "189--203", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.09.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000440", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Broderick:2005:FTE, author = "J. Stuart Broderick", title = "Firewalls --- Are they enough protection for current networks?", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "4", pages = "204--212", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.10.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000476", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Eschelbeck:2005:LVW, author = "Gerhard Eschelbeck", title = "The Laws of Vulnerabilities: Which security vulnerabilities really matter?", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "4", pages = "213--219", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.09.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000646", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Walker:2005:ESP, author = "John Walker", title = "The extended security perimeter", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "4", pages = "220--227", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.09.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270500049X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Curphey:2005:WSD, author = "Mark Curphey", title = "{Web} services: Developers dream or hackers heaven?", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "4", pages = "228--235", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.09.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000439", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Cracknell:2005:WLP, author = "Phil Cracknell", title = "Why `Phish' when you can Trawl?", journal = j-INFO-SEC-TECH-REP, volume = "10", number = "4", pages = "236--239", month = "????", year = "2005", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.09.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:34 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000506", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2006:Pa, author = "Anonymous", title = "Pages 1--66 (2006)", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "1", pages = "??--??", month = "????", year = "2006", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2006:E, author = "Chez Ciechanowicz", title = "Editorial", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "1", pages = "1--1", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.01.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000045", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sundt:2006:ISL, author = "Chris Sundt", title = "Information security and the law", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "1", pages = "2--9", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.11.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000737", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Walden:2006:CSP, author = "Ian Walden", title = "Communication service providers: Forensic source and investigatory tool", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "1", pages = "10--17", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.11.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000725", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Zaba:2006:DSL, author = "Stefek Zaba", title = "Digital signature legislation: the first 10 years", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "1", pages = "18--25", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.12.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000021", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Broderick:2006:ISS, author = "J. Stuart Broderick", title = "{ISMS}, security standards and security regulations", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "1", pages = "26--31", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.12.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000750", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pinder:2006:PIS, author = "Phil Pinder", title = "Preparing Information Security for legal and regulatory compliance ({Sarbanes--Oxley} and {Basel II})", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "1", pages = "32--38", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.12.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000786", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Walton:2006:CMA, author = "Richard Walton", title = "The {Computer Misuse Act}", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "1", pages = "39--45", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.11.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000749", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Charlesworth:2006:FUD, author = "Andrew Charlesworth", title = "The future of {UK} data protection regulation", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "1", pages = "46--54", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.12.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000762", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hardy:2006:UIG, author = "Gary Hardy", title = "Using {IT} governance and {COBIT} to deliver value with {IT} and respond to legal, regulatory and compliance challenges", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "1", pages = "55--61", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2005.12.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412705000774", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Lacey:2006:NIN, author = "David Lacey", title = "A new institute for a new millennium", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "1", pages = "62--65", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.01.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000033", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2006:Pb, author = "Anonymous", title = "Pages 67--108 (2006)", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "2", pages = "??--??", month = "????", year = "2006", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ganley:2006:IC, author = "Michael Ganley", title = "Introduction --- Cryptography", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "2", pages = "67--67", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.03.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000227", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Walton:2006:CT, author = "Richard Walton", title = "Cryptography and trust", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "2", pages = "68--71", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.03.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270600015X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Paterson:2006:CTI, author = "Kenneth G. Paterson", title = "A cryptographic tour of the {IPsec} standards", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "2", pages = "72--81", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.03.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000185", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Robshaw:2006:ORT, author = "Matthew J. B. Robshaw", title = "An overview of {RFID} tags and new cryptographic developments", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "2", pages = "82--88", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.03.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000215", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ward:2006:ECP, author = "M. Ward", title = "{EMV} card payments --- an update", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "2", pages = "89--92", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.03.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000161", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bond:2006:IIT, author = "Mike Bond and Jolyon Clulow", title = "Integrity of intention (a theory of types for security {APIs})", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "2", pages = "93--99", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.03.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000173", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Cid:2006:RDC, author = "Carlos Cid", title = "Recent developments in cryptographic hash functions: Security implications and future directions", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "2", pages = "100--107", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.03.007", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/hash.bib; http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000203", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2006:Pc, author = "Anonymous", title = "Pages 109--158 (2006)", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "3", pages = "??--??", month = "????", year = "2006", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schwiderski-Grosche:2006:SEU, author = "S. Schwiderski-Grosche", title = "Security: an end user perspective", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "3", pages = "109--110", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.06.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000380", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bernecker:2006:BSE, author = "Otto Bernecker", title = "Biometrics: security: an end user perspective", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "3", pages = "111--118", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.05.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000379", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Borcea-Pfitzmann:2006:WUC, author = "Katrin Borcea-Pfitzmann and Marit Hansen and Katja Liesebach and Andreas Pfitzmann and Sandra Steinbrecher", title = "What user-controlled identity management should learn from communities", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "3", pages = "119--128", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.03.008", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000343", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Berger:2006:SSE, author = "Brian Berger", title = "Security standards: an end-user perspective", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "3", pages = "129--136", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.05.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000331", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Wright:2006:SCB, author = "Tim Wright", title = "Security considerations for broadcast systems", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "3", pages = "137--146", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.05.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000367", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mayes:2006:PHD, author = "Keith E. Mayes and Konstantinos Markantonakis", title = "On the potential of high density smart cards", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "3", pages = "147--153", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.05.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270600032X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ruedinger:2006:CDT, author = "Jens Ruedinger", title = "The complexity of {DPA} type side channel attacks and their dependency on the algorithm design", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "3", pages = "154--158", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.05.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:35 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000355", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2006:Pd, author = "Anonymous", title = "Pages 159--202 (2006)", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "4", pages = "??--??", month = "????", year = "2006", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Price:2006:EVI, author = "G. Price", title = "Editorial for v.11 n.4 of the {{\booktitle{Information Security Technical Report}}}: ``{Windows} Security Revisited''", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "4", pages = "159--159", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.09.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000525", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Wolthusen:2006:WDI, author = "Stephen D. Wolthusen", title = "{Windows} device interface security", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "4", pages = "160--165", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.10.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000537", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Abimbola:2006:NSM, author = "A. A. Abimbola and J. M. Munoz and W. J. Buchanan", title = "{NetHost-sensor}: Monitoring a target host's application via system calls", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "4", pages = "166--175", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.10.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000550", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Phillips:2006:WVS, author = "I. Phillips", title = "{Windows Vista} security: First impressions", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "4", pages = "176--185", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.10.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000549", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{LaMacchia:2006:NVE, author = "Brian A. LaMacchia and John L. Manferdelli", title = "New Vistas in elliptic curve cryptography", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "4", pages = "186--192", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.09.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000513", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{England:2006:VME, author = "Paul England and John Manferdelli", title = "Virtual machines for enterprise desktop security", journal = j-INFO-SEC-TECH-REP, volume = "11", number = "4", pages = "193--202", month = "????", year = "2006", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2006.09.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412706000501", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2007:Pa, author = "Anonymous", title = "Pages 1--68 (2007)", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "1", pages = "??--??", month = "????", year = "2007", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Wolthusen:2007:ISI, author = "Stephen D. Wolthusen", title = "{ISTR} special issue on critical infrastructure protection", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "1", pages = "1--1", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.02.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000040", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schmitz:2007:STI, author = "W. Schmitz", title = "Simulation and test: Instruments for {Critical Infrastructure Protection (CIP)}", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "1", pages = "2--15", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.02.007", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000088", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Audestad:2007:IMG, author = "Jan A. Audestad", title = "{Internet} as a multiple graph structure: the role of the transport layer", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "1", pages = "16--23", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.02.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000027", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Roman:2007:RWS, author = "Rodrigo Roman and Cristina Alcaraz and Javier Lopez", title = "The role of {Wireless Sensor Networks} in the area of {Critical Information Infrastructure Protection}", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "1", pages = "24--31", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.02.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000052", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Elgoarany:2007:SMI, author = "Khaled Elgoarany and Mohamed Eltoweissy", title = "Security in {Mobile IPv6}: a survey", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "1", pages = "32--43", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.02.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000039", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Svendsen:2007:CMI, author = "Nils Kalstad Svendsen and Stephen D. Wolthusen", title = "Connectivity models of interdependency in mixed-type critical infrastructure networks", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "1", pages = "44--55", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.02.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000076", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Burbeck:2007:ART, author = "Kalle Burbeck and Simin Nadjm-Tehrani", title = "Adaptive real-time anomaly detection with incremental clustering", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "1", pages = "56--67", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.02.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000064", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2007:Pb, author = "Anonymous", title = "Pages 69--110 (2007)", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "2", pages = "??--??", month = "????", year = "2007", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Jones:2007:C, author = "Andrew Jones", title = "Convergence", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "2", pages = "69--73", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.04.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270700009X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Clayton:2007:CCT, author = "Richard Clayton", title = "Can {CLI} be trusted?", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "2", pages = "74--79", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.04.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000118", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schultz:2007:RDC, author = "E. Eugene Schultz", title = "Risks due to convergence of physical security systems and information technology environments", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "2", pages = "80--84", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.06.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000295", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Paine:2007:SMA, author = "Richard H. Paine", title = "{Secure Mobile Architecture (SMA)} --- a way to fix the broken {Internet}", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "2", pages = "85--89", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.04.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270700012X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{King:2007:NCW, author = "Paul King", title = "In the new converged world are we secure enough?", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "2", pages = "90--97", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.04.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000106", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Samani:2007:WNC, author = "Raj Samani", title = "When networks collide", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "2", pages = "98--110", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.06.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:36 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000301", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2007:Pc, author = "Anonymous", title = "Pages 111--186 (2007)", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "3", pages = "??--??", month = "????", year = "2007", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Tomlinson:2007:E, author = "A. Tomlinson", title = "Editorial", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "3", pages = "111--112", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.05.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000246", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Martin:2007:GSN, author = "Andrew Martin and Po-Wah Yau", title = "Grid security: Next steps", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "3", pages = "113--122", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.05.009", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000222", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Chen:2007:DGS, author = "Haibo Chen and Jieyun Chen and Wenbo Mao and Fei Yan", title = "{Daonity} --- Grid security from two levels of virtualization", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "3", pages = "123--138", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.05.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000258", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Lopez:2007:DRS, author = "Javier Lopez and Isaac Agudo and Jose A. Montenegro", title = "On the deployment of a real scalable delegation service", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "3", pages = "139--146", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.05.008", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000283", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Chadwick:2007:CDM, author = "David Chadwick", title = "Coordinated decision making in distributed applications", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "3", pages = "147--154", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.05.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000234", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Paar:2007:ESP, author = "Christof Paar and Andr{\'e} Weimerskirch", title = "Embedded security in a pervasive world", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "3", pages = "155--161", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.05.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270700026X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Leung:2007:SCM, author = "Adrian Leung and Yingli Sheng and Haitham Cruickshank", title = "The security challenges for mobile ubiquitous services", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "3", pages = "162--171", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.05.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000209", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hayat:2007:USU, author = "Zia Hayat and Jeff Reeve and Chris Boutle", title = "Ubiquitous security for ubiquitous computing", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "3", pages = "172--178", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.05.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000210", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Zhou:2007:EML, author = "Jianying Zhou and Wee-Yung Chin and Rodrigo Roman and Javier Lopez", title = "An effective multi-layered defense framework against spam", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "3", pages = "179--185", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.05.007", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000271", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2007:Pd, author = "Anonymous", title = "Pages 187--250 (2007)", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "4", pages = "??--??", month = "????", year = "2007", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ganley:2007:II, author = "Michael J. Ganley", title = "Introduction to this issue (12/4)", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "4", pages = "187--187", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.10.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000520", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Overill:2007:CIA, author = "Richard E. Overill", title = "Computational immunology and anomaly detection", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "4", pages = "188--191", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.09.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000428", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Burgess:2007:BII, author = "Mark Burgess", title = "Biology, immunology and information security", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "4", pages = "192--199", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.10.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000568", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ghanea-Hercock:2007:SC, author = "Robert Ghanea-Hercock", title = "Survival in cyberspace", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "4", pages = "200--208", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.10.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270700057X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Shafi:2007:BIC, author = "Kamran Shafi and Hussein A. Abbass", title = "Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "4", pages = "209--217", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.09.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000416", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Aickelin:2007:SDI, author = "Uwe Aickelin and Julie Greensmith", title = "Sensing danger: Innate immunology for intrusion detection", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "4", pages = "218--227", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.10.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000544", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Somayaji:2007:IDH, author = "Anil Somayaji", title = "Immunology, diversity, and homeostasis: the past and future of biologically inspired computer defenses", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "4", pages = "228--234", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.10.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000556", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dasgupta:2007:IIA, author = "Dipankar Dasgupta", title = "Immuno-inspired autonomic system for cyber defense", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "4", pages = "235--241", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.10.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000532", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Gelenbe:2007:DSV, author = "Erol Gelenbe", title = "Dealing with software viruses: a biological paradigm", journal = j-INFO-SEC-TECH-REP, volume = "12", number = "4", pages = "242--250", month = "????", year = "2007", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2007.11.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:37 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412707000593", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2008:P, author = "Anonymous", title = "Pages 1--44 (2008)", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "1", pages = "??--??", month = "????", year = "2008", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Gollmann:2008:SWA, author = "Dieter Gollmann", title = "Securing {Web} applications", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "1", pages = "1--9", month = "????", year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.02.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000046", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Saglietti:2008:WGB, author = "Francesca Saglietti and Norbert Oster and Florin Pinte", title = "White and grey-box verification and validation approaches for safety- and security-critical software systems", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "1", pages = "10--16", month = "????", year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.03.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000071", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{McDermott:2008:REX, author = "J. McDermott and J. Kirby and B. Montrose and T. Johnson and M. Kang", title = "Re-engineering {Xen} internals for higher-assurance security", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "1", pages = "17--24", month = "????", year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.01.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000022", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Desmet:2008:SCN, author = "Lieven Desmet and Wouter Joosen and Fabio Massacci and Pieter Philippaerts and Frank Piessens and Ida Siahaan and Dries Vanoverberghe", title = "Security-by-contract on the {.NET} platform", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "1", pages = "25--32", month = "????", year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.02.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000034", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Chess:2008:DTP, author = "Brian Chess and Jacob West", title = "Dynamic taint propagation: Finding vulnerabilities without attacking", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "1", pages = "33--39", month = "????", year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.02.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000058", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Brown:2008:SSD, author = "Mason Brown and Alan Paller", title = "Secure software development: Why the development world awoke to the challenge", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "1", pages = "40--43", month = "????", year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.03.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270800006X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2008:PA, author = "Anonymous", title = "Pages 111--192 ({August 2008})", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "3", pages = "??--??", month = aug, year = "2008", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Tomlinson:2008:DMC, author = "Allan Tomlinson", title = "Developments in mobile communications security", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "3", pages = "111--111", month = aug, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000472", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{vanCleeff:2008:FCM, author = "Andr{\'e} van Cleeff", title = "Future consumer mobile phone security: a case study using the data-centric security model", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "3", pages = "112--117", month = aug, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000460", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Leung:2008:MDM, author = "Adrian Leung", title = "A mobile device management framework for secure service delivery", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "3", pages = "118--126", month = aug, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.09.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270800040X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{MacDonald:2008:AKA, author = "John A. MacDonald", title = "Authentication \& key agreement for off-portal mobile applications", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "3", pages = "127--135", month = aug, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000459", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mayrhofer:2008:SMD, author = "Rene Mayrhofer and Hans Gellersen", title = "Spontaneous mobile device authentication based on sensor data", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "3", pages = "136--150", month = aug, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000447", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Lo:2008:NMA, author = "N. W. Lo and Kuo-Hui Yeh and Chan Yeob Yeun", title = "New mutual agreement protocol to secure mobile {RFID}-enabled devices", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "3", pages = "151--157", month = aug, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.09.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000423", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Yeun:2008:SAG, author = "Chan Yeob Yeun and Kyusuk Han and Duc Liem Vo and Kwangjo Kim", title = "Secure authenticated group key agreement protocol in the {MANET} environment", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "3", pages = "158--164", month = aug, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000435", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Krauss:2008:HIA, author = "Christoph Krau{\ss} and Markus Schneider and Claudia Eckert", title = "On handling insider attacks in wireless sensor networks", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "3", pages = "165--172", month = aug, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.011", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000551", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mayes:2008:MCS, author = "Keith E. Mayes and Konstantinos Markantonakis", title = "Mobile communication security controllers an evaluation paper", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "3", pages = "173--192", month = aug, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.09.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:38 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000411", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2008:PN, author = "Anonymous", title = "Pages 193--256 ({November 2008})", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "4", pages = "??--??", month = nov, year = "2008", CODEN = "ISTRFR", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Coles-Kemp:2008:I, author = "Lizzie Coles-Kemp", title = "Introduction", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "4", pages = "193--194", month = nov, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.015", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000575", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ashenden:2008:ISM, author = "Debi Ashenden", title = "Information Security management: a human challenge?", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "4", pages = "195--201", month = nov, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000484", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Crinson:2008:ALI, author = "Iain Crinson", title = "Assessing the `insider--outsider threat' duality in the context of the development of public--private partnerships delivering `choice' in healthcare services: a sociomaterial critique", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "4", pages = "202--206", month = nov, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.007", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000496", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Williams:2008:LTE, author = "Patricia A. H. Williams", title = "In a `trusting' environment, everyone is responsible for information security", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "4", pages = "207--215", month = nov, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.009", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000538", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Overill:2008:III, author = "Richard E. Overill", title = "{ISMS} insider intrusion prevention and detection", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "4", pages = "216--219", month = nov, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.014", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000563", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Jones:2008:CMI, author = "Andy Jones", title = "Catching the malicious insider", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "4", pages = "220--224", month = nov, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.008", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000526", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Walker:2008:PMM, author = "Terrence Walker", title = "Practical management of malicious insider threat --- an enterprise {CSIRT} perspective", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "4", pages = "225--234", month = nov, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.013", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270800054X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Probst:2008:EAS, author = "Christian W. Probst and Ren{\'e} Rydhof Hansen", title = "An extensible analysable system model", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "4", pages = "235--246", month = nov, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.012", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000502", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Humphreys:2008:ISM, author = "Edward Humphreys", title = "Information security management standards: Compliance, governance and risk management", journal = j-INFO-SEC-TECH-REP, volume = "13", number = "4", pages = "247--255", month = nov, year = "2008", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2008.10.010", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412708000514", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Muttik:2009:CST, author = "Igor Muttik and Chris Barton", title = "Cloud security technologies", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "1", pages = "1--6", month = feb, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.03.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000028", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Harley:2009:MSA, author = "David Harley", title = "Making sense of anti-malware comparative testing", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "1", pages = "7--15", month = feb, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.03.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270900003X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Shabtai:2009:DMC, author = "Asaf Shabtai and Robert Moskovitch and Yuval Elovici and Chanan Glezer", title = "Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "1", pages = "16--29", month = feb, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.03.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000041", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Rautiainen:2009:LPD, author = "Sami Rautiainen", title = "A look at {Portable Document Format} vulnerabilities", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "1", pages = "30--33", month = feb, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.04.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib; http://www.math.utah.edu/pub/tex/bib/postscri.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000065", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ganley:2009:II, author = "Michael J. Ganley", title = "Introduction to this issue", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "2", pages = "35--35", month = may, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.07.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000259", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Leng:2009:SCA, author = "Xuefei Leng", title = "Smart card applications and security", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "2", pages = "36--45", month = may, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.06.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000223", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Markantonakis:2009:ASC, author = "Konstantinos Markantonakis and Michael Tunstall and Gerhard Hancke and Ioannis Askoxylakis and Keith Mayes", title = "Attacking smart card systems: Theory and practice", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "2", pages = "46--56", month = may, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.06.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270900017X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Boswell:2009:SCS, author = "Tony Boswell", title = "Smart card security evaluation: Community solutions to intractable problems", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "2", pages = "57--69", month = may, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.06.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000181", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sauveron:2009:MSC, author = "Damien Sauveron", title = "Multiapplication smart card: Towards an open smart card?", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "2", pages = "70--78", month = may, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.06.007", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000247", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Rankl:2009:HDA, author = "Wolfgang Rankl", title = "How to defend against smartcard attacks --- Or the amazing number of different ways to check a {PIN} securely", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "2", pages = "79--86", month = may, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.06.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270900020X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mayes:2009:TTS, author = "Keith E. Mayes and Konstantinos Markantonakis and Gerhard Hancke", title = "Transport ticketing security and fraud controls", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "2", pages = "87--95", month = may, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.06.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000193", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Liersch:2009:EPS, author = "Ingo Liersch", title = "Electronic passports --- from secure specifications to secure implementations", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "2", pages = "96--100", month = may, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.06.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000211", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Chaumette:2009:SCR, author = "Serge Chaumette and Damien Sauveron", title = "Smart cards and remote computing: Interaction or convergence?", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "2", pages = "101--110", month = may, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.06.008", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:39 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000235", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Coles-Kemp:2009:CSP, author = "Lizzie Coles-Kemp", title = "The changing shape of privacy and consent", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "111--112", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.10.008", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000430", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Elahi:2009:PCD, author = "Shirin Elahi", title = "Privacy and consent in the digital era", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "113--118", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.10.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000399", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bennett:2009:RPI, author = "Louise Bennett", title = "Reflections on privacy, identity and consent in on-line services", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "119--123", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.10.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000387", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hilton:2009:ISM, author = "Jeremy Hilton", title = "Improving the secure management of personal data: Privacy on-line {IS} important, but it's not easy", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "124--130", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.10.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000405", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Churchill:2009:LPP, author = "Andrew Churchill", title = "`{Privacy} and public policy delivery --- Dichotomy or design'", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "131--137", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.10.009", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000442", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Malik:2009:PCP, author = "Nazir A. Malik and Allan Tomlinson", title = "Privacy and consent in pervasive networks", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "138--142", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.10.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000375", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Birch:2009:VVP, author = "David G. W. Birch", title = "{Victorian} values: Politicians and the public incorrectly see security and privacy as opposites", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "143--145", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.10.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000417", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Wilton:2009:WHP, author = "Robin Wilton", title = "{What}'s happened to {PETs}?", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "146--153", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.10.010", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000454", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Whitley:2009:IPC, author = "Edgar A. Whitley", title = "Informational privacy, consent and the ``control'' of personal data", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "154--159", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.10.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000363", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bryce:2009:YPD, author = "Jo Bryce and Mathias Klang", title = "Young people, disclosure of personal information and online privacy: Control, choice and consequences", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "160--166", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.10.007", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000429", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bogdanovic:2009:NEP, author = "Danijela Bogdanovic and Conn Crawford and Lizzie Coles-Kemp", title = "The need for enhanced privacy and consent dialogues", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "167--172", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.10.011", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000466", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2009:FPG, author = "Anonymous", title = "The first practical guide to data security law and breach action!", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "3", pages = "173--173", month = aug, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.09.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412709000351", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Smith:2009:CSB, author = "Martin Smith", title = "Changing staff behaviour", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "4", pages = "175--175", month = nov, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.08.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000105", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Furnell:2009:IMT, author = "S. M. Furnell", title = "The irreversible march of technology", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "4", pages = "176--180", month = nov, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.04.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000038", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Coles-Kemp:2009:ISM, author = "Lizzie Coles-Kemp", title = "Information security management: an entangled research challenge", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "4", pages = "181--185", month = nov, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.04.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000063", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Colwill:2009:HFI, author = "Carl Colwill", title = "Human factors in information security: the insider threat --- Who can you trust these days?", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "4", pages = "186--196", month = nov, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.04.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000051", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Stewart:2009:SAI, author = "Geordie Stewart", title = "A safety approach to information security communications", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "4", pages = "197--201", month = nov, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.04.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341271000004X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mubarak:2009:PCI, author = "Sameera Mubarak and Jill Slay", title = "Protecting clients from insider attacks on trust accounts", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "4", pages = "202--212", month = nov, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.04.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000075", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Jones:2009:HDY, author = "Andrew Jones", title = "How do you make information security user friendly?", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "4", pages = "213--216", month = nov, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.04.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000026", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Tsiakis:2009:CCS, author = "Theodosios Tsiakis", title = "Contribution of corporate social responsibility to information security management", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "4", pages = "217--222", month = nov, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.05.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000087", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Eminagaoglu:2009:POI, author = "Mete Emina{\u{g}}ao{\u{g}}lu and Erdem U{\c{c}}ar and {\c{S}}aban Eren", title = "The positive outcomes of information security awareness training in companies --- a case study", journal = j-INFO-SEC-TECH-REP, volume = "14", number = "4", pages = "223--229", month = nov, year = "2009", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.05.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000099", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2010:PC, author = "Chez Ciechanowicz", title = "Protocols and cryptography", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "1", pages = "1--1", month = feb, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.11.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000385", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sundt:2010:CRW, author = "Chris Sundt", title = "Cryptography in the real world", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "1", pages = "2--7", month = feb, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000270", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mayes:2010:MCS, author = "Keith E. Mayes and Carlos Cid", title = "The {MIFARE Classic} story", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "1", pages = "8--12", month = feb, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.009", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000348", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Patsos:2010:SNP, author = "Dimitrios Patsos and Chez Ciechanowicz and Fred Piper", title = "The status of {National PKIs} --- a {European} overview", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "1", pages = "13--20", month = feb, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.007", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000324", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dent:2010:CKS, author = "Alexander W. Dent", title = "Choosing key sizes for cryptography", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "1", pages = "21--27", month = feb, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000312", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{French:2010:CV, author = "George French and Mike Bond", title = "Caveat venditor", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "1", pages = "28--32", month = feb, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000282", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Srinivasan:2010:IBE, author = "Sriramkrishnan Srinivasan", title = "Identity based encryption: Progress and challenges", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "1", pages = "33--40", month = feb, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:40 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000269", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ciechanowicz:2010:ITR, author = "Chez Ciechanowicz", title = "Identity Theft and Reconstruction", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "2", pages = "41--41", month = may, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.12.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000506", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Furnell:2010:OIG, author = "S. M. Furnell", title = "Online identity: Giving it all away?", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "2", pages = "42--46", month = may, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.09.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000245", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Oqvist:2010:AA, author = "Karen Lawrence {\"O}qvist", title = "The art of alchemy", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "2", pages = "47--50", month = may, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.09.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000257", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Langheinrich:2010:SNR, author = "Marc Langheinrich and G{\"u}nter Karjoth", title = "Social networking and the risk to companies and institutions", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "2", pages = "51--56", month = may, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.09.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000233", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Tomlinson:2010:PTM, author = "Allan Tomlinson and Po-Wah Yau and John A. MacDonald", title = "Privacy threats in a mobile enterprise social network", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "2", pages = "57--66", month = may, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000294", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Jones:2010:DFI, author = "Andy Jones and T. Martin", title = "Digital forensics and the issues of identity", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "2", pages = "67--71", month = may, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.008", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000336", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Oqvist:2010:FG, author = "Karen Lawrence {\"O}qvist", title = "Fool's gold", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "2", pages = "72--75", month = may, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000300", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Austen:2010:CCU, author = "John Austen", title = "Computer crime --- a 2011 update", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "3", pages = "77--78", month = aug, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.01.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000112", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Elliott:2010:BWE, author = "Claire Elliott", title = "Botnets: To what extent are they a threat to information security?", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "3", pages = "79--103", month = aug, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.11.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341271000049X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Choo:2010:HTC, author = "Kim-Kwang Raymond Choo", title = "High tech criminal threats to the national information infrastructure", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "3", pages = "104--111", month = aug, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2009.09.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341270900034X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Sarkar:2010:AIT, author = "Kuheli Roy Sarkar", title = "Assessing insider threats to information security using technical, behavioural and organisational measures", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "3", pages = "112--133", month = aug, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.11.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000488", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Walker:2010:MTS, author = "William Walker", title = "Mobile telephony security compromises", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "3", pages = "134--136", month = aug, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.01.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000021", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Marien:2010:MBP, author = "Andr{\'e} Mar{\"\i}en", title = "Matchmaking between {PCI-DSS} and Security", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "4", pages = "137--137", month = nov, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.03.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000252", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ataya:2010:PDA, author = "Georges Ataya", title = "{PCI DSS} audit and compliance", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "4", pages = "138--144", month = nov, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.02.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341271100015X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Tutton:2010:IRC, author = "Jeff Tutton", title = "Incident response and compliance: a case study of the recent attacks", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "4", pages = "145--149", month = nov, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.02.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000124", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Peterson:2010:ACA, author = "Gunnar Peterson", title = "From auditor-centric to architecture-centric: {SDLC} for {PCI DSS}", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "4", pages = "150--153", month = nov, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.02.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000148", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Valentine:2010:CCH, author = "J. Andrew Valentine", title = "Compliance complacency: How `check-box' compliancy remains a pitfall for many organizations worldwide", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "4", pages = "154--159", month = nov, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.02.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000136", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Williams:2010:HTE, author = "Branden R. Williams", title = "How tokenization and encryption can enable {PCI DSS} compliance", journal = j-INFO-SEC-TECH-REP, volume = "15", number = "4", pages = "160--165", month = nov, year = "2010", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.02.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:41 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000161", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Wolthusen:2011:NGN, author = "Stephen Wolthusen", title = "Next generation networks", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "1", pages = "1--2", month = feb, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.07.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000367", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Atay:2011:CSA, author = "Serap Atay and Marcelo Masera", title = "Challenges for the security analysis of {Next Generation Networks}", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "1", pages = "3--11", month = feb, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.010", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341271000035X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Rebahi:2011:SFS, author = "Yacine Rebahi and Mohamed Nassar and Thomas Magedanz and Olivier Festor", title = "A survey on fraud and service misuse in voice over {IP (VoIP)} networks", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "1", pages = "12--19", month = feb, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.012", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000373", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Mazzariello:2011:CNU, author = "Claudio Mazzariello and Paolo {De Lutiis} and Dario Lombardo", title = "Clustering {NGN} user behavior for anomaly detection", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "1", pages = "20--28", month = feb, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2010.10.011", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412710000361", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Zhang:2011:SEI, author = "Ge Zhang and Yacine Rebahi", title = "Side effects of identity management in {SIP VoIP} environment", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "1", pages = "29--35", month = feb, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.07.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000379", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Watters:2011:SNT, author = "Paul A. Watters", title = "Social networking threats", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "2", pages = "37--37", month = may, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.09.007", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000586", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Weir:2011:TSN, author = "George R. S. Weir and Fergus Toolan and Duncan Smeed", title = "The threats of social networking: Old wine in new bottles?", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "2", pages = "38--43", month = may, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.09.008", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000598", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Quayle:2011:SNN, author = "Ethel Quayle and Max Taylor", title = "Social networking as a nexus for engagement and exploitation of young people", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "2", pages = "44--50", month = may, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.09.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", note = "See corrigendum \cite{Quayle:2012:CSN}.", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000574", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Islam:2011:RTD, author = "Mofakharul Islam and Paul A. Watters and John Yearwood", title = "Real-time detection of children's skin on social networking sites using {Markov} random field modelling", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "2", pages = "51--58", month = may, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.09.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000550", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Gupta:2011:BAN, author = "Gaurav Gupta and Josef Pieprzyk and Len Hamey", title = "Bucket attack on numeric set watermarking model and safeguards", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "2", pages = "59--66", month = may, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.09.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000537", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Gupta:2011:STP, author = "Gaurav Gupta and Josef Pieprzyk", title = "Socio-technological phishing prevention", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "2", pages = "67--73", month = may, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.09.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000549", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Qi:2011:SNS, author = "Man Qi and Denis Edgar-Nevill", title = "Social networking searching and privacy issues", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "2", pages = "74--78", month = may, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.09.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000562", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Watters:2011:HMM, author = "Paul A. Watters and Robert Layton and Richard Dazeley", title = "How much material on {BitTorrent} is infringing content? {A} case study", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "2", pages = "79--87", month = may, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.10.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000616", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Dorey:2011:CCC, author = "P. G. Dorey and A. Leite", title = "Commentary: Cloud computing --- a security problem or solution?", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "3--4", pages = "89--96", month = aug, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.08.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000495", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Wilson:2011:PPC, author = "Piers Wilson", title = "Positive perspectives on cloud security", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "3--4", pages = "97--101", month = aug, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.08.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000471", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Teneyuca:2011:ICS, author = "David Teneyuca", title = "{Internet} cloud security: the illusion of inclusion", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "3--4", pages = "102--107", month = aug, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.08.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000501", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Abbadi:2011:TC, author = "Imad M. Abbadi and Andrew Martin", title = "Trust in the Cloud", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "3--4", pages = "108--114", month = aug, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.08.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000513", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Coles-Kemp:2011:LCB, author = "Lizzie Coles-Kemp and Joseph Reddington and Patricia A. H. Williams", title = "Looking at clouds from both sides: the advantages and disadvantages of placing personal narratives in the cloud", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "3--4", pages = "115--122", month = aug, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.09.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000525", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Ahmad:2011:CMA, author = "Zaheer Ahmad and Keith E. Mayes and Song Dong and Kostas Markantonakis", title = "Considerations for mobile authentication in the Cloud", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "3--4", pages = "123--130", month = aug, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.09.009", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000604", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Lang:2011:ARC, author = "Ulrich Lang and Rudolf Schreiner", title = "Analysis of recommended cloud security controls to validate {OpenPMF} ``policy as a service''", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "3--4", pages = "131--141", month = aug, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.08.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341271100046X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{vanCleeff:2011:IAM, author = "Andr{\'e} van Cleeff and Wolter Pieters and Roel Wieringa and Frits van Tiel", title = "Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization", journal = j-INFO-SEC-TECH-REP, volume = "16", number = "3--4", pages = "142--149", month = aug, year = "2011", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.08.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:42 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000483", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Jirasek:2012:PAI, author = "Vladimir Jirasek", title = "Practical application of information security models", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "1--2", pages = "1--8", month = feb, year = "2012", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.12.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000872", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Walker:2012:ECC, author = "Simon Walker", title = "Economics and the cyber challenge", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "1--2", pages = "9--18", month = feb, year = "2012", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.12.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000860", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bunker:2012:TET, author = "Guy Bunker", title = "Technology is not enough: Taking a holistic view for information assurance", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "1--2", pages = "19--25", month = feb, year = "2012", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2011.12.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412711000859", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Pflug:2012:FEV, author = "Anika Pflug and Daniel Hartung and Christoph Busch", title = "Feature extraction from vein images using spatial information and chain codes", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "1--2", pages = "26--35", month = feb, year = "2012", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2012.02.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412712000234", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Bours:2012:CKD, author = "Patrick Bours", title = "Continuous keystroke dynamics: a different perspective towards biometric evaluation", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "1--2", pages = "36--43", month = feb, year = "2012", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2012.02.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412712000027", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Quayle:2012:CSN, author = "Ethel Quayle and Max Taylor", title = "Corrigendum to {``Social networking as a nexus for engagement and exploitation of young people'' [Inform Secur Tech Rep {\bf 16} (2) (2011) 44--50]}", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "1--2", pages = "44--44", month = feb, year = "2012", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2012.02.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", note = "See \cite{Quayle:2011:SNN}.", URL = "http://www.sciencedirect.com/science/article/pii/S1363412712000039", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Askoxylakis:2013:SPD, author = "Ioannis G. Askoxylakis and Mark Manulis and Joachim Posegga", title = "Security and privacy for digital ecosystems", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "3", pages = "45--45", month = feb, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2013.02.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412713000022", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Chow:2013:SAS, author = "Sherman S. M. Chow and Man Ho Au and Willy Susilo", title = "Server-aided signatures verification secure against collusion attack", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "3", pages = "46--57", month = feb, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2012.10.007", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412712000489", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Petroulakis:2013:LFS, author = "Nikolaos E. Petroulakis and Elias Z. Tragos and Alexandros G. Fragkiadakis and George Spanoudakis", title = "A lightweight framework for secure life-logging in smart environments", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "3", pages = "58--70", month = feb, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2012.10.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412712000465", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Schreckling:2013:KRT, author = "Daniel Schreckling and Johannes K{\"o}stler and Matthias Schaff", title = "{Kynoid}: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for {Android}", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "3", pages = "71--80", month = feb, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2012.10.006", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412712000477", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{DellAmico:2013:HHS, author = "Matteo Dell'Amico and Gabriel Serme and Muhammad Sabir Idrees and Anderson Santana de Oliveira and Yves Roudier", title = "{HiPoLDS}: a {Hierarchical Security Policy Language for Distributed Systems}", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "3", pages = "81--92", month = feb, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2012.10.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S136341271200043X", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Catuogno:2013:SSC, author = "Luigi Catuogno and Roberto Gassir{\`a} and Michele Masullo and Ivan Visconti", title = "{SmartK}: Smart cards in operating systems at kernel level", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "3", pages = "93--104", month = feb, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2012.10.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412712000441", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Christin:2013:SSP, author = "Delphine Christin and Pablo S{\'a}nchez L{\'o}pez and Andreas Reinhardt and Matthias Hollick and Michaela Kauer", title = "Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "3", pages = "105--116", month = feb, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2012.10.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412712000453", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Franz:2013:SCN, author = "M. Franz and B. Deiseroth and K. Hamacher and S. Jha and S. Katzenbeisser and H. Schr{\"o}der", title = "Secure computations on non-integer values with applications to privacy-preserving sequence analysis", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "3", pages = "117--128", month = feb, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2012.10.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412712000428", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Anonymous:2013:ASI, author = "Anonymous", title = "{ARES 2012} special issue", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "4", pages = "129--130", month = may, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2013.04.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412713000216", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Hachana:2013:SAR, author = "Safa{\`a} Hachana and Fr{\'e}d{\'e}ric Cuppens and Nora Cuppens-Boulahia and Joaquin Garcia-Alfaro", title = "Semantic analysis of role mining results and shadowed roles detection", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "4", pages = "131--147", month = may, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2013.03.001", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412713000174", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Baumgrass:2013:BGB, author = "Anne Baumgrass and Mark Strembeck", title = "Bridging the gap between role mining and role engineering via migration guides", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "4", pages = "148--172", month = may, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2013.03.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412713000198", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Wright:2013:ATE, author = "Jason L. Wright and Miles McQueen and Lawrence Wellman", title = "Analyses of two end-user software vulnerability exposure metrics (extended version)", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "4", pages = "173--184", month = may, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2013.02.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412713000125", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Riesner:2013:ASS, author = "Moritz Riesner and Michael Netter and G{\"u}nther Pernul", title = "Analyzing settings for social identity management on {Social Networking Sites}: Classification, current state, and proposed developments", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "4", pages = "185--198", month = may, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2013.02.005", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412713000150", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Feledi:2013:TWB, author = "Daniel Feledi and Stefan Fenz and Lukas Lechner", title = "Toward {Web}-based information security knowledge sharing", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "4", pages = "199--209", month = may, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2013.03.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412713000204", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Herzberg:2013:OFS, author = "Amir Herzberg and Haya Shulman", title = "Oblivious and fair server-aided two-party computation", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "4", pages = "210--226", month = may, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2013.03.002", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412713000186", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Fruhwirt:2013:IDF, author = "Peter Fr{\"u}hwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar Weippl", title = "{InnoDB} database forensics: Enhanced reconstruction of data manipulation queries from redo logs", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "4", pages = "227--238", month = may, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2013.02.003", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412713000137", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", } @Article{Plos:2013:MPB, author = "Thomas Plos and Christian Maierhofer", title = "On measuring the parasitic backscatter of sensor-enabled {UHF RFID} tags", journal = j-INFO-SEC-TECH-REP, volume = "17", number = "4", pages = "239--252", month = may, year = "2013", CODEN = "ISTRFR", DOI = "https://doi.org/10.1016/j.istr.2013.02.004", ISSN = "1363-4127 (print), 1873-605X (electronic)", ISSN-L = "1363-4127", bibdate = "Sun May 8 07:58:43 MDT 2022", bibsource = "http://www.math.utah.edu/pub/tex/bib/infosectechrep.bib", URL = "http://www.sciencedirect.com/science/article/pii/S1363412713000149", acknowledgement = ack-nhfb, ajournal = "Info. Sec. Tech. Rep.", fjournal = "Information Security Technical Report", journal-URL = "https://www.sciencedirect.com/journal/information-security-technical-report", }