Journal: Inf. Sec. Techn. Report

Volume 13, Issue 4

193 -- 194Lizzie Coles-Kemp. Introduction
195 -- 201Debi Ashenden. Information Security management: A human challenge?
202 -- 206Iain Crinson. Assessing the 'insider-outsider threat' duality in the context of the development of public-private partnerships delivering 'choice' in healthcare services: A sociomaterial critique
207 -- 215Patricia A. H. Williams. In a 'trusting' environment, everyone is responsible for information security
216 -- 219Richard E. Overill. ISMS insider intrusion prevention and detection
220 -- 224Andy Jones. Catching the malicious insider
225 -- 234Terrence Walker. Practical management of malicious insider threat - An enterprise CSIRT perspective
235 -- 246Christian W. Probst, René Rydhof Hansen. An extensible analysable system model
247 -- 255Edward Humphreys. Information security management standards: Compliance, governance and risk management

Volume 13, Issue 3

111 -- 0Allan Tomlinson. Developments in mobile communications security
112 -- 117André van Cleeff. Future consumer mobile phone security: A case study using the data-centric security model
118 -- 126Adrian Leung. A mobile device management framework for secure service delivery
127 -- 135John A. MacDonald. Authentication & key agreement for off-portal mobile applications
136 -- 150Rene Mayrhofer, Hans Gellersen. Spontaneous mobile device authentication based on sensor data
151 -- 157Nai-Wei Lo, Kuo-Hui Yeh, Chan Yeob Yeun. New mutual agreement protocol to secure mobile RFID-enabled devices
158 -- 164Chan Yeob Yeun, Kyusuk Han, Duc-Liem Vo, Kwangjo Kim. Secure authenticated group key agreement protocol in the MANET environment
165 -- 172Christoph Krauß, Markus Schneider 0002, Claudia Eckert. On handling insider attacks in wireless sensor networks
173 -- 192Keith Mayes, Konstantinos Markantonakis. Mobile communication security controllers an evaluation paper

Volume 13, Issue 2

45 -- 0Michael J. Ganley. Introduction to this issue
46 -- 53Siddhartha Arora. National e-ID card schemes: A European overview
54 -- 60Danny De Cock, Koen Simoens, Bart Preneel. Insights on identity documents based on the Belgian case study
61 -- 70Tony Collings. Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID)
71 -- 75Paul De Hert. Identity management of e-ID, privacy and security in Europe. A human rights view
76 -- 82Thomas Myhr. Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution: or I am 621216-1318, but I am also 161262-43774. Do you know who I am?
83 -- 94Marit Hansen, Andreas Pfitzmann, Sandra Steinbrecher. Identity management throughout one's whole life
95 -- 103Geraint Price. The benefits and drawbacks of using electronic identities
105 -- 110John Steer, Ashish Popli. Building secure business applications at Microsoft

Volume 13, Issue 1

1 -- 9Dieter Gollmann. Securing Web applications
10 -- 16Francesca Saglietti, Norbert Oster, Florin Pinte. White and grey-box verification and validation approaches for safety- and security-critical software systems
17 -- 24John McDermott, James Kirby, Bruce E. Montrose, Travis Johnson, Myong H. Kang. Re-engineering Xen internals for higher-assurance security
25 -- 32Lieven Desmet, Wouter Joosen, Fabio Massacci, Pieter Philippaerts, Frank Piessens, Ida Siahaan, Dries Vanoverberghe. Security-by-contract on the .NET platform
33 -- 39Brian Chess, Jacob West. Dynamic taint propagation: Finding vulnerabilities without attacking
40 -- 43Mason Brown, Alan Paller. Secure software development: Why the development world awoke to the challenge