279 papers found
Refreshing results…
Towards a Privacy Audit Programmes Comparison Framework
Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks
Enhancing Knowledge Management Through the Use of GIS and Multimedia.
Security requirements for e-government services: A methodological approach for developing a common PKI-based security policy
ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information
Towards a framework for evaluating certificate status information mechanisms
Privacy Enhancing Technologies: A Review.
Security Policy Configuration Issues in Grid Computing Environments.
Introducing PKI to Enhance Security in Future Mobile Networks
GRID Security Review
Quality assured trusted third parties for deploying secure internet-based healthcare applications
Using SSL/TLS in authentication and key agreement procedures of future mobile networks.
Support for Legal Framework and Anonymity in the KEYSTONE Public Key Infrastructure Architecture
A digital seal solution for deploying trust on commercial transactions
Towards an ISO-9000 compliant certification service provider.
Risk management for new information technology insertion in a shipping company
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
Distributed component software security issues on deploying a secure electronic marketplace
Architectures for secure portable executable content
Security requirements, risks and recommendations for small enterprise and home-office environments.
Missing publications? Read more about our data sources.