The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kunihito Yamamori, Toru Abe, Susumu Horiguchi Performance Evaluation of a Partial Retraining Scheme for Defective Multi-Layer Neural Networks. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Rajiv A. Ravindran, Rajat Moona Retargetable Cache Simulation Using High Level Processor Models. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1K. John Gough Stacking them up: a Comparison of Virtual Machines. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Kenji Watanabe, Wanming Chu, Yamin Li Exploiting Java Instruction/Thread Level Parallelism with Horizontal Multithreading. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Shu-Lin Hwang, Feipei Lai Two Cache Lines Prediction for a Wide-Issue Micro-architecture. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1 6th Australasian Computer Systems Architecture Conference (ACSAC 2001), 29-30 January 2001, Gold Coast, Queensland, Australia Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  BibTeX  RDF
1Mohit Aron, Jochen Liedtke, Kevin Elphinstone, Yoonho Park, Trent Jaeger, Luke Deller The SawMill Framework for Virtual Memory Diversity. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1David Brodrick, Anwar S. Dawood, Neil W. Bergmann, Melanie Wark Error Detection for Adaptive Computing Architectures in Spacecraft Applications. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ronald Pose Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Chris R. Jesshope Implementing an efficient vector instruction set in a chip multi-processor using micro-threaded pipelines. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Antony Edwards, Gernot Heiser Components + Security = OS Extensibility. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1G. Hariprakash, R. Achutharaman, Amos Omondi DSTRIDE: Data-Cache Miss-Address-Based Stride Prefetching Scheme for Multimedia Processors. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Heui Lee, Paul Becket, Bill Appelbe High-Performance Extendable Instruction Set Computing. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Peter K. K. Loh, Heiko Schröder, Wen-Jing Hsu Fault-Tolerant Routing on Complete Josephus Cubes. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Neil W. Bergmann, Anwar S. Dawood Adaptive Interfacing with Reconfigurable Computers. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Grant B. Wigley, David A. Kearney The First Real Operating System for Reconfigurable Computers. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ernest A. Fardin, Peter Munro, Jarred Scagliotta, John Morris A Simulator for High Speed Digital Communications. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Shan Jiang, Sean W. Smith, Kazuhiro Minami Securing Web Servers against Insider Attack . Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1D. W. Gresty, Qi Shi 0001, Madjid Merabti Requirements for a General Framework for Response to Distributed Denial-of-Service. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati A Component-Based Architecture for Secure Data Publication. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Wayne A. Jansen Determining Privileges of Mobile Agents. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan The Performance Measurement of Cryptographic Primitives on Palm Devices. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Peng Liu 0005 DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Database Security, Intrusion Tolerance, Isolation
1Stephen D. Wolthusen Security Policy Enforcement at the File System Level in the Windows NT Operating System Family. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Albert Levi, Çetin Kaya Koç CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Anna Entrichel, James Bergman, Jason Willis, Herb Little Computing Without Wires (Or Even a Net): The Pitfalls, Potentials, and Practicality of Wireless Networking. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Paul Ashley, Heather M. Hinton, Mark Vandenwauver Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1John C. Munson, Scott Wimer Watcher: The Missing Piece of the Security Puzzle. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens Managing Alerts in a Multi-Intrusion Detection Environmen. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF IDMEF, cooperative intrusion detection, alert clustering, alert merging, IDS, DTD
1Ronald Mraz Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Germano Caronni, Christoph L. Schuba Enabling Hierarchical and Bulk-Distribution for Watermarked Content. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ross J. Anderson Why Information Security is Hard-An Economic Perspective. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Anita K. Jones, Yu Lin Application Intrusion Detection using Language Library Calls. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  BibTeX  RDF
1Anita Jones, Song Li Temporal Signatures for Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF application intrusion detection, temporal signature, security
1John E. Dobson, Brian Randell Building Reliable Secure Computing Systems out of Unreliable Insecure Components. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Andreas Schaad Detecting Conflicts in a Role-Based Delegation Model. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Pete Epstein, Ravi S. Sandhu Engineering of Role/Permission Assignments. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ron Gula, Gene Kim, Chris Klaus, Paul Proctor Security Vendor CTOs: Perspectives, Opinions, and Lessons Learned. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1David M. Wheeler, Adam Conyers, Jane Luo, Alex Xiong Java Security Extensions for a Java Server in a Hostile Environment. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Eric Monteith Genoa TIE, Advanced Boundary Controller Experiment. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1David Mankins, Rajesh Krishnan, Ceilyn Boyd, John Zao, Michael Frentz Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ramaswamy Chandramouli A Framework for Multiple Authorization Types in a Healthcare Application System. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Günter Karjoth The Authorization Service of Tivoli Policy Director. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1John McHugh An Information Flow Tool for Gypsy. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Tim Buchheim, Michael Erlinger, Benjamin S. Feinstein, Gregory A. Matthews, Roy Pollock, Joseph Betser, Andy Walther Implementing the Intrusion Detection Exchange Protocol. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Bernd Blobel Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1John P. McDermott Abuse-Case-Based Assurance Arguments. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ulrich Lang 0001, Dieter Gollmann, Rudolf Schreiner Verifiable Identifiers in Middleware Security. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Charles Payne, Tom Markham Architecture and Applications for a Distributed Embedded Firewall. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Peter Herrmann Information Flow Analysis of Component-Structured Applications. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Klaus Julisch Mining Alarm Clusters to Improve Alarm Handling Efficiency. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Matt Bishop, Anup K. Ghosh, James A. Whittaker How Useful is Software Fault Injection for Evaluating the Security of COTS Products? Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Benjamin S. Feinstein, Gregory A. Matthews, Stuart Staniford, Andy Walther Experiences Implementing a Common Format for IDS Alerts. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Nathalie Weiler Secure Anonymous Group Infrastructure for Common and Future Internet Applications. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF scalable anonymity, configurable end-to-end anonymous communication, pseudonymous multicast, anonymous group communication
1Victoria Ungureanu A Regulated Approach to Certificate Management. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Valentin Razmov, Daniel R. Simon Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Dan Thomsen Introduction to Classic Papers. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Yih Huang, David Rine, Xunhua Wang A JCA-Based Implementation Framework for Threshold Cryptography. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Roger R. Schell Information Security: Science, Pseudoscience, and Flying Pigs. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Tao Wan, Xue Dong Yang IntruDetector: A Software Platform for Testing Network Intrusion Detection Algorithms. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Wenliang Du, Mikhail J. Atallah Privacy-Preserving Cooperative Statistical Analysis. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1James M. Hayes Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean A Security Model for Military Message Systems: Retrospective. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Storage channels, Security, Verification, confinement, message systems
1Ulf Lindqvist, Phillip A. Porras eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001 Introducing Decryption Authority into PKI. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF decryption authority, DA, sensitive messages, asymmetric encryption, Internet, electronic commerce, electronic commerce, digital signature, public key cryptography, public key cryptography, PKI, message authentication, Internet security, telecommunication security, online transactions
1Peter Gutmann A Reliable, Scalable General-Purpose Certificate Store. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF general-purpose certificate store, scalability, standards, operating system, software reliability, software reliability, availability, public key cryptography, public key cryptography, PKI, error recovery, authorisation
1Weiliang Zhao, Vijay Varadharajan, Yi Mu 0001 Fair On-line Gambling. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF fair on-line gambling, fair electronic gambling scheme, gambling outcome, optimal fair exchange metho, gambling message exchange, off-line Trusted Third Party, Internet, Internet, transaction processing, entertainment, security of data, cheating, payment, financial data processing
1E. Strother Denial of Service Protection - The Nozzle. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource
1Eugenio Faldella, Marco Prandini A Novel Approach to On-Line Status Authentication of Public-Key Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks
1Murat Aydos, Tugrul Yanik, Çetin Kaya Koç An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications
1Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang Experience with Software Watermarking. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF program-transformation attacks, heap-space usage, watermark retrieval time, protection technique, tamperproofing, Java, Java, data structures, security of data, execution times, obfuscation, dynamic data structures, code size, software watermarking, copy protection
1Joon S. Park, Ravi S. Sandhu Binding Identities and Attributes using Digitally Signed Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF binding identities, digitally signed certificates, binding attributes, chained signatures, monolithic signatures, autonomic signatures, digital signature, certification, message authentication, certificate authority, attribute certificates
1John Viega, J. T. Bloch, Y. Kohno, Gary McGraw ITS4: A Static Vulnerability Scanner for C and C++ Code. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ITS4, static vulnerability scanner, C++ code, security-critical source code, real-time feedback, e-commerce software, software tools, security of data, software packages, software package, C language, software vulnerabilities, C++ language, C code
1Michael A. Schneider, Edward W. Felten Efficient Commerce Protocols based on One-Time Pads. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad
1Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine Enabling Secure On-Line DNS Dynamic Update. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure online DNS dynamic update, Internet Engineering Task Force, DNS Security Extension, zone security key, role separation principle, signature computation time, Internet, authentication, cryptography, distributed databases, RSA, transport protocols, experimental results, message authentication, threshold cryptography, telecommunication security, MD5, Domain Name System, IP addresses, performance penalty, DNSSEC
1Ezedin Barka, Ravi S. Sandhu Framework for Role-based Delegation Models. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF role-based delegation models, authorisation
1E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine Calculating Costs for Quality of Security Service. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security service quality, security information storage, security information retrieval, task security model, variant security service invocation, dynamic network modes, abstract security level choices, resource utilization costs, efficient task schedule estimation, research prototype, scheduling, quality of service, information retrieval, scalability, computer networks, costing, costing, security of data, system integration, telecommunication security, information storage, resource management system
1Jeff Hayes Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jeremy Epstein, L. Thomas, Eric Monteith Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF operating system wrappers, commercial firewalls, fine grained control, application proxy firewalls, experiments, computer networks, network operating systems, authorisation, telecommunication security, applications software, malicious software
1Ian Brown, B. Laurie Security Against Compelled Disclosure. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF compelled disclosure, confidential information, government agencies, national economic security, organised crime, information assets, ethics, security of data, data security, data privacy, telecommunication security, legislation, legislation, organisations, computer crime, communication security
1Reiner Sailer, Matthias Kabatnik History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF history-based distributed filtering, network-level access control, nondiscretionary access control model, data packet exchange, subversive channels, secrecy requirements, trustworthiness validation, data integrity, data integrity, tagging, packet switching, data communication, authorisation, electronic data interchange, telecommunication security, data transmission, context information, telecommunication network management, security levels, state information, security labels, subnetworks
1Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell Secure Smart Homes using Jini and UIUC SESAME. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure smart homes, dynamically configurable consumer devices, distributed security mechanism, Tiny SESAME, distributed devices, Java, Java, access control, distributed processing, public key cryptography, public key cryptography, handheld devices, authorisation, Jini, component-based software, home automation, Kerberos, access rights, Sun Microsystems, smart devices
1Margus Freudenthal, Sven Heiberg, Jan Willemson Personal Security Environment on Palm PDA. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF personal security environment, Palm PDA, secret signing key, mobile computing device, smart-card reader, mobile security applications, device selection, private key handling, mobile computing, personal digital assistant, smart cards, personal computing, message authentication, microcomputer applications, digital signature schemes, design issues, notebook computers
1André L. M. dos Santos, Richard A. Kemmerer Implementing Security Policies using the Safe Areas of Computation Approach. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Safe Areas of Computation approach, business costs, SAC approach, Internet, Internet, World Wide Web, digital libraries, digital libraries, security policies, authorisation, information resources, telecommunication security, bank data processing, access control lists, online banks
1Germano Caronni, Sandeep Kumar, Christoph L. Schuba, Glenn Scott Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky A Policy-based Access Control Mechanism for the Corporate Web. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF policy-based access control mechanism, corporate Web, security problems, management problems, corporate intranet, formal statement, policy engines, business data processing, authorisation, intranets, intranets, access control lists
1Thomas E. Daniels, Eugene H. Spafford A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF network audit system, NASHID, operating system audit trails, low-level network attacks, application sources, network protocol stack, audit data, audit data accumulation, Linux, Unix, security of data, auditing, network operating systems, computer network management, system calls, host-based intrusion detection
1Chenxi Wang, John C. Knight, Matthew C. Elder On Computer Viral Infection and the Effect of Immunization. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF anti-virus systems, virus protection schemes, computer networks, simulation study, telecommunication security, computer network security, computer viruses, computer viruses, immunization
1P. C. Clark, M. C. Meissner, K. O. Vance Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure compartmented data access, untrusted network, COTS-based architecture, secure network computing architecture, application-level firewalls, DoD applications, software architecture, access control, electronic commerce, computer networks, authorisation, telecommunication security, electronic business, military computing, military applications, sensitive information, commercial-off-the-shelf products, sensitive data
1Christoph C. Michael, Anup K. Ghosh Two State-based Approaches to Program-based Anomaly Detection. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF state-based approaches, program-based anomaly detection, intrusion detection algorithms, execution audit data, statistical deviation monitoring, finite state machines, finite-state machine, security of data, software performance evaluation, experimental results, auditing, n-grams, algorithm performance
1 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  BibTeX  RDF
1Kai Rannenberg, Giovanni Iachello Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity
1Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu Policy Mediation for Multi-Enterprise Environments. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF policy mediation, multi-enterprise environments, uniform security services, heterogeneous information networks, access control policy management, large enterprise information networks, Policy Machine, Policy Mediation Architecture, software architecture, middleware, static analysis, business data processing, authorisation, information networks, formal techniques, software infrastructures
1Johann Großschädl The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency
1Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture
1Pierre Bieber, D. Raujol, Pierre Siron Security Architecture for Federated Cooperative Information Systems. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF federated cooperative information systems, role-based policy, software architecture, interoperability, CORBA, distributed databases, case study, open systems, security of data, security architecture, distributed object management, commercial off the shelf components
1Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF system offensiveness, liability problem, intranet security, security tools performance, distributed tools, Internet, Internet, network security, security of data, security architectures, computer network management, security attacks, DoS attacks
1John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi Extending Java for Package based Access Control. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF package based access control, programmable security, TBAC, primitive ticket, language translation preprocessor, security service library, ticket management, Java, object-oriented programming, RBAC, MAC, source code, software libraries, syntax, authorisation, program interpreters, DAC, Java language, bytecode interpretation
1Uwe Jendricke, Daniela Gerd tom Markotten Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security mechanism usability, protection goals, personal security assistant, security functions configuration, security functionality, user identity selection, inexperienced users, security needs negotiation, Internet, user interfaces, user interface, human factors, Identity-Manager, personal computing, Internet applications, authorisation, telecommunication security
Displaying result #1201 - #1300 of 1667 (100 per page; Change: )
Pages: [<<][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license