Author of the publication

Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application.

, , , , and . Communications and Multimedia Security, volume 175 of IFIP, page 159-171. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusted Internet Forensics: design of a network forensics appliance, , and . Proceedings of the First IEEE/CreateNet Computer Network Forensics Research, IEEE, IEEE, (September 2005)E-vote and Pki's: a Need, a Bliss or a Curse?, , and . Secure Electronic Voting, volume 7 of Advances in Information Security, Springer, (2003)Software engineering for secure systems., , and . ICSE, page 1007-1008. ACM, (2006)The Complexity of Computing Maximal Word Functions., , and . Comput. Complex., (1993)String distances and intrusion detection: Bridging the gap between formal languages and computer security., and . RAIRO Theor. Informatics Appl., 40 (2): 303-313 (2006)Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues., and . Mob. Networks Appl., 7 (6): 503-511 (2002)On Race Vulnerabilities in Web Applications., , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 126-142. Springer, (2008)FluXOR: Detecting and Monitoring Fast-Flux Service Networks., , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 186-206. Springer, (2008)The Complexity of Computing Maximal Word Functions., and . FCT, volume 529 of Lecture Notes in Computer Science, page 157-167. Springer, (1991)A Tool for Pro-active Defense Against the Buffer Overrun Attack., , and . ESORICS, volume 1485 of Lecture Notes in Computer Science, page 17-31. Springer, (1998)