|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 738 occurrences of 436 keywords
|
|
|
Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Heejin Jang, Sangwook Kim |
A Self-Extension Monitoring for Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 196-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare |
1 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 128-137, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
1 | Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta |
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 138-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
interoperable security infrastructure, AT? Labs, multiple certificate authorities, third-party CA systems, uniform enrollment procedures, Verisign, authenticated IP services, policy descriptions, certificate sources, X.509v3 certificates, CRML, PKCS, X509, XML, software architecture, authentication, public key cryptography, certification, client-server systems, public key infrastructure, revocation, intranets, message authentication, CRL, OCSP, middleware platform |
1 | Jaehong Park, Ravi S. Sandhu, J. Schifalacqua |
Security Architectures for Controlled Digital Information Dissemination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 224-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
controlled digital information dissemination, application-level security, use control, control set, distribution style, cryptography, virtual machine, watermarking, security of data, business data processing, information dissemination, security architectures, business, copy protection |
1 | Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman |
A Flexible Access Control Service for Java Mobile Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 356-365, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
flexible access control service, Java mobile code, remote servers, distributed heterogeneous clients, foreign code execution, host node protection, code protection, sandbox model, downloaded code, source location, inter-organisational environments, expressive languages, Ponder, Java security architecture, Java, Internet, specification languages, security policies, signature, distributed programming, Internet applications, authorisation, declarative language, technology diffusion, dynamic loading |
1 | Dale M. Johnson, Lee A. Benzinger |
Layering Boundary Protections: An Experiment in Information Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 60-66, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
DARPA Information Assurance Program, boundary protection layering, attack protection, experiment, security of data, data security, client-server systems, client server system, data privacy, data confidentiality |
1 | Konstantin Knorr |
Dynamic Access Control through Petri Net Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 159-167, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Petri net workflows, access control matrix, privileges, data misuse, Petri nets, information systems, information systems, authorisation, workflow management software, protection mechanism, dynamic access control |
1 | Michael J. Petkac, Lee Badger |
Security Agility in Response to Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 11-20, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
security agility, cooperative frameworks, malicious attacks, mission critical functionality, security policy reconfiguration, runtime security policy change, prototype toolkit, flexible host-based response, distributed systems, intrusion detection, distributed processing, software components, security of data |
1 | Holger Vogt, Henning Pagnia, Felix C. Gärtner |
Modular Fair Exchange Protocols for Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 3-11, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Distributed Computing, Electronic Commerce, Fair Exchange, Protocol Design, Protocol Composition |
1 | John G. Brainard |
SecurSight: An Architecture for Secure Information Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 349-357, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
authentication, architecture, authorization, PKI |
1 | Charles N. Payne, D. J. Thomsen, J. Bogle, Richard C. O'Brien |
Napoleon: A Recipe for Workflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 134-142, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
workflow, role-based access control, security policy, distributed system security |
1 | John P. McDermott, Chris Fox |
Using Abuse Case Models for Security Requirements Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 55-64, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
security, UML, requirements, use case |
1 | David A. Cooper |
A Model of Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 256-264, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
certificate revocation, certification authority, CRL, certificate revocation list |
1 | Marco Prandini |
Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 276-281, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, Enrique Areizaga, Juàn Manuel Mateos |
Secure Communications in ATM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 84-93, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Paul, Maryline Laurent, Sylvain Gombault |
An Asynchronous Distributed Access Control Architecture for IP over ATM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 75-83, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Security, Access Control, Agents, ATM, Management, IP-over-ATM |
1 | Heather M. Hinton, Crispin Cowan, Lois M. L. Delcambre, Shawn Bowers |
SAM: Security Adaptation Manager . ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 361-370, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Shabnam Erfani, C. Sekar Chandersekaran |
Generic Support for PKIX Certificate Management in CDSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 269-275, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
CDSA, PKIX, Certificate management, architecture |
1 | Arthur D. Friedman, Ellie Padgett, Mark Rasch, Scott Charney, John Thomas |
Legal and Technical Responses to Protecting the U. S. Critical Infrastructures (Panel). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 299-302, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia E. Irvine, Timothy E. Levin |
Toward a Taxonomy and Costing Method for Security Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 183-188, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
security cost, quality of security service, network security service, security taxonomy, resource management system |
1 | John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi |
Security Policy Coordination for Heterogeneous Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 219-228, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
information enclaves, access control, mediators, authorization policy |
1 | Ravi S. Sandhu, Qamar Munawer |
The ARBAC99 Model for Administration of Roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 229-238, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Arianna Arona, Danilo Bruschi, Emilia Rosti |
Adding Availability to Log Services of Untrusted Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 199-206, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
security, fault-tolerance, availability, log files |
1 | Marcus Oestreicher |
Transactions in Java Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 291-298, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Transactions, Smartcard, Java Card |
1 | Nittida Nuansri, Samar Singh, Tharam S. Dillon |
A Process State-Transition Analysis and Its Application to Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 378-387, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Jared Karro, Jie Wang 0002 |
Towards a Practical, Secure, and Very Large Scale Online Election. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 161-169, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Online Election |
1 | Pietro Iglio |
TrustedBox: A Kernel-Level Integrity Checker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 189-198, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
integrity checker |
1 | Ross J. Anderson |
How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Chris Sinclair, Lyn Pierce, Sara Matzner |
An Application of Machine Learning to Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 371-377, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Charlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers |
User Authentication and Authorization in the Java(tm) Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 285-290, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Mahesh V. Tripunitara, Partha Dutta |
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 303-309, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Tim Wilkinson, Dave Hearn, Simon R. Wiseman |
Trustworthy Access Control with Untrustworthy Web Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 12-21, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
access control, web, encryption |
1 | Susan Hinrichs |
Policy-Based Management: Bridging the Gap. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 209-218, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Stephen H. Brackin |
Using Checkable Types in Automatic Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 99-108, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Formal Methods, Cryptographic Protocols, Automatic Analysis |
1 | Amgad Fayad, Sushil Jajodia, Catherine D. McCollum |
Application-Level Isolation Using Data Inconsistency Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 119-126, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Security, databases, Intrusion Detection, Isolation, Information Warfare |
1 | Myong H. Kang, Brian J. Eppinger, Judith N. Froscher |
Tools to Support Secure Enterprise Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 143-152, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Security, Workflow, Tool, Enterprise computing |
1 | Selwyn Russell |
Fast Checking of Individual Certificate Revocation on Small Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 249-255, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Michael Wichert, David B. Ingham, Steve J. Caughey |
Non-repudiation Evidence Generation for CORBA using XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 320-327, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Security, XML, e-commerce, CORBA, non-repudiation |
1 | André L. M. dos Santos, Richard A. Kemmerer |
Safe Areas of Computation for Secure Computing with Insecure Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 35-44, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Benecke |
A Parallel Packet Screen for High Speed Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 67-74, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Packet Screen, Parallel Processing, Firewall, High Speed Networks |
1 | Konstantin Beznosov, Yi Deng 0001, Bob Blakley 0001, Carol C. Burt, John F. Barkley |
A Resource Access Decision Service for CORBA-Based Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 310-319, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
distributed systems, Access control, CORBA, computer security, RAD |
1 | Richard E. Newman, Mark V. Hoyt, Tim Swanson, Phillipe Broccard, Mark Sanders, Joe Winner |
Design of LAN-Lock, A System for Securing Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 170-177, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Richard B. Neely |
Security Architecture Development and Results for a Distributed Modeling and Simulation System . ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 341-348, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
information security, modeling and simulation, security architecture, accreditation |
1 | Wenliang Du, Praerit Garg, Aditya P. Mathur |
Security Relevancy Analysis on the Registry of Windows NT 4.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 331-338, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Alexander W. Röhm, Gaby Herrmann, Günther Pernul |
A Language for Modeling Secure Business Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 22-31, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
bussiness transactions, modeling security, electronic commerce, electronic markets |
1 | Ron Ross, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Blaine Burnham, Rayford B. Vaughn |
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 265-, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Douglas L. Long, Julie Baker, Francis Fung |
A Prototype Secure Workflow Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 129-133, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
workflow, security policy |
1 | James Kirby, Myla Archer, Constance L. Heitmeyer |
SCR: A Practical Approach to Building a High Assurance COMSEC System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 109-118, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Rolf Oppliger, Andreas Greulich, Peter Trachsel |
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 241-248, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
certification authority (CA), Public key cryptography, public key infrastructure (PKI), public key certificate |
1 | Jeremy Epstein |
Architecture and Concepts of the ARGuE Guard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 45-54, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | |
15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![IEEE Computer Society, 0-7695-0346-2 The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
1 | Stephen M. Matyas, Allen Roginsky |
An Effective Defense Against First Party Attacks in Public-Key Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 155-160, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Encryption, Hash function, Public key |
1 | Chang N. Zhang, Ming Y. Deng, Ralph Mason |
Two Improved Algorithms and Hardware Implementations for Key Distribution Using Extended Programmable Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 244-249, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Alexander W. Röhm, Günther Pernul, Gaby Herrmann |
Modeling Secure and Fair Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 155-164, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Vesna Hassler, O. Then |
Controlling Applets' Behavior in a Browser. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 120-125, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Jared Karro, Jie Wang 0002 |
Protecting Web Servers from Security Holes in Server-Side Includes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 103-111, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Edward Amoroso, R. Kwapniewski |
Selection Criteria for Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 280-288, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Qamar Munawer |
The RRA97 Model for Role-Based Administration of Role Hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 39-49, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Kathrin Schier |
Multifunctional Smart Cards for Electronic Commerce-Application of the Role and Task-Based Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 147-154, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | |
14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![IEEE Computer Society, 0-8186-8789-4 The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
1 | Yi Mu 0001, Vijay Varadharajan |
Anonymous Secure E-Voting Over a Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 293-299, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Pietro Iglio, Fausto Fraticelli, Luigi Giuri |
Rule-Based Filtering for Java Applets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 112-119, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni |
An Architecture for Intrusion Detection Using Autonomous Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 13-24, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Bryony Pomeroy, Simon R. Wiseman |
Private Desktops and Shared Store. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 190-200, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Tasneem G. Brutch, Paul C. Brutch |
Mutual Authentication, Confidentiality, and Key Management (MACKMAN) System for Mobile Computing and Wireless Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 308-317, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Roger Wright, David J. Shifflett, Cynthia E. Irvine |
Security Architecture for a Virtual Heterogeneous Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 167-177, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Michael Clifford, C. Lavine, Matt Bishop |
The Solar Trust Model: Authentication Without Limitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 300-307, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Quazi N. Ahmed, Susan V. Vrbsky |
Maintaining Security in Firm Real-Time Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 83-90, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Michiharu Kudo |
Electronic Submission Protocol Based on Temporal Accountability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 353-363, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Lucas C. Ferreira, Ricardo Dahab |
A Scheme for Analyzing Electronic Payment Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 137-146, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | D. J. Thomsen, D. O'Brien, J. Bogle |
Role-Based Access Control Framework for Network Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 50-58, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Herbert Leitold, Udo Payer, Reinhard Posch |
A Hardware-Independent Encryption Model for ATM Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 205-211, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | George F. Jelen, Jeffrey R. Williams |
A Practical Approach to Measuring Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 333-343, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan, Chris Crall, Joe Pato |
Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 178-189, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Bruce Schneier, James Riordan |
A Certified E-Mail Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 347-352, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | P. C. Hyland, Ravi S. Sandhu |
Concentric Supervision of Security Applications: A New Security Management Paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 59-68, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Anup K. Ghosh, James Wanken, Frank Charron |
Detecting Anomalous and Unknown Intrusions Against Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 259-267, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Yuh-Min Tseng, Jinn-ke Jan |
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 237-243, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Roland Büschkes, Dogan Kesdogan, Peter Reichl |
How to Increase Security in Mobile Networks by Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 3-12, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Mourad Debbabi, Y. Legaré, Mohamed Mejri |
An Environment for the Specification and Analysis of Cryptoprotocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 321-332, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Vigna, Richard A. Kemmerer |
NetSTAT: A Network-Based Intrusion Detection Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 25-34, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Reiner Sailer |
Security Services in an Open Service Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 223-234, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | M. A. Bahie-Eldin, A. A. Omar |
Complexity Measure of Encryption Keys Used for Securing Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 250-255, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Peng Liu 0005, Catherine D. McCollum |
Application-Level Isolation to Cope with Malicious Database Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 73-82, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Rajan Shankaran, Vijay Varadharajan |
Secure Signaling and Access Control for ATM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 212-222, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Myong H. Kang, Judith N. Froscher, Brian J. Eppinger |
Towards an Infrastructure for MLS Distributed Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 91-100, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | F. C. Smith, D. J. Bailey |
Wachet auf! Computer Security and the Millenium. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 129-133, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | D. Endler |
Intrusion Detection Applying Machine Learning to Solaris Audit Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA, pp. 268-279, 1998, IEEE Computer Society, 0-8186-8789-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | James W. Freeman, T. C. Darr, Richard B. Neely |
Risk Assessment for Large Heterogeneous Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 44-53, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
security risk assessment process, large heterogeneous systems, C/sup 4/I systems, weapon systems, subsystem-level approaches, risk assessment resource allocation, hybrid top-down system-wide approach, guided top-down approach, approval-to-operate decision, security of data, decision makers |
1 | Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan |
Secure and Efficient Digital Coins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 9-15, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
digital coins, electronic cash systems, complex online computations, payment phase, off-line anonymous cash scheme, payment transactions, unconditional client anonymity, double-spending detection, coin forgery, framing attacks, security, efficiency, EFTS |
1 | Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz |
An Architecture for Multilevel Secure Interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 194-204, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
multilevel secure interoperability architecture, commercial sector, cost effective high assurance multilevel security, small communities, high assurance secure solution, MLS architecture, commercial single level hardware, specialized security devices, MLS CORBA, NRL Pump, Starlight Interactive Link, MLS cooperative computing, distributed computing, standards, distributed processing, heterogeneous environments, computer systems, COTS components, security levels |
1 | Kymie M. C. Tan, Blair R. Collie |
Detection and Classification of TCP/IP Network Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 99-107, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
TCP/IP network service classification, computer intruders, remote terminal software, undetectable access, system audit, intruder activity detection, unauthorised network services, network connection signature, neural network, learning, monitoring, experiment, transport protocols, data security, network traffic, generalisation, Australia, law enforcement |
1 | Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan |
Micro-Digital Money for Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 2-8, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
micro-digital money, cash-based micropayment schemes, double-locked hash chain technique, digital coin divisibility, digital coin transferability, coin chain, vendor, multiple chains, micropayment transactions, electronic commerce, EFTS |
1 | Chris Hall, Bruce Schneier |
Remote Electronic Gambling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 232-238, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
remote electronic gambling, casino games, random bit generation, random permutation generation, player/player collusions, player/dealer collusions, secure audit trail, debt payment, security, Internet, Internet, fairness, public key cryptography |
1 | George M. Mohay, J. Zellers |
Kernel and Shell-Based Applications Integrity Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 34-43, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues |
1 | Yung-Cheng Lee, Chi-Sung Laih |
On the Key Recovery of the Key Escrow System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 216-220, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy |
1 | Dan Thompson, M. Denz |
Incremental Assurance for Multilevel Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 81-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
incremental assurance approach, multilevel applications, high assurance database, economics, costs, security of data, data security, multilevel database |
1 | T. Lowman, D. Mosier |
Applying the DOD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 183-193, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
DoD goal security architecture, enterprise security architectures, Department of Defense Goal Security Architecture, knowledgeable security professionals, enterprise information system security profiles, multiple organizations, multiple program types, security tasks, military computing, security assessments, structured approach |
1 | T. Mitchem, R. Lu, R. O'Brian |
Using Kernel Hypervisors to Secure Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 175-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
kernel hypervisors, secure applications, selective control, loadable module, unbypassable security wrappers, application specific security requirements, client kernel hypervisors, application specific policies, loadable modules, user systems, malicious active content, wrapping servers, firewall services, Web browser, operating system kernels, Linux kernel, COTS components, replication services |
1 | Bruce Schneier, Chris Hall |
An Improved E-Mail Security Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 227-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy |
Displaying result #1301 - #1400 of 1667 (100 per page; Change: ) Pages: [ <<][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ 17][ >>] |
|