0 | -- | 0 | Jim Whitmore, Sven Türpe, Stefan Triller, Andreas Poller, Christina Carlson. Threat analysis in the software development lifecycle |
0 | -- | 0 | Musheer Ahmed, Mustaque Ahamad, Tushar Jaiswal. Augmenting security and accountability within the eHealth Exchange |
0 | -- | 0 | Aris Gkoulalas-Divanis, Grigorios Loukides, Jimeng Sun. Toward smarter healthcare: Anonymizing medical data to support research studies |
0 | -- | 0 | M. A. Himmel, F. Grossman. Security on distributed systems: Cloud security versus traditional IT |
0 | -- | 0 | A. R. Szakal, K. J. Pearsall. Open industry standards for mitigating risks to global supply chains |
0 | -- | 0 | Tamas Visegrady, Silvio Dragone, Michael Osborne. Stateless cryptography for virtual environments |
0 | -- | 0 | Aris Gkoulalas-Divanis, Pol Mac Aonghusa. Privacy protection in open information management platforms |
0 | -- | 0 | Michael Baentsch, Peter Buhler, Luis Garcés-Erice, Thomas Gschwind, Frank Höring, Michael Kuyper, Andreas Schade, Paolo Scotton, Peter Urbanetz. IBM Secure Enterprise Desktop |
0 | -- | 0 | Diego A. Ortiz-Yepes, Reto Hermann, Hansruedi Steinauer, Peter Buhler. Bringing strong authentication and transaction security to the realm of mobile devices |
0 | -- | 0 | H. Kitayama, S. Munetoh, K. Ohnishi, Naohiko Uramoto, Y. Watanabe. Advanced security and privacy in connected vehicles |