The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Heejin Jang, Sangwook Kim A Self-Extension Monitoring for Security Management. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare
1Petra Wohlmacher, Peter Pharow Applications in Health Care using Public-Key Certificates and Attribute Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures
1Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF interoperable security infrastructure, AT? Labs, multiple certificate authorities, third-party CA systems, uniform enrollment procedures, Verisign, authenticated IP services, policy descriptions, certificate sources, X.509v3 certificates, CRML, PKCS, X509, XML, software architecture, authentication, public key cryptography, certification, client-server systems, public key infrastructure, revocation, intranets, message authentication, CRL, OCSP, middleware platform
1Jaehong Park, Ravi S. Sandhu, J. Schifalacqua Security Architectures for Controlled Digital Information Dissemination. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF controlled digital information dissemination, application-level security, use control, control set, distribution style, cryptography, virtual machine, watermarking, security of data, business data processing, information dissemination, security architectures, business, copy protection
1Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman A Flexible Access Control Service for Java Mobile Code. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF flexible access control service, Java mobile code, remote servers, distributed heterogeneous clients, foreign code execution, host node protection, code protection, sandbox model, downloaded code, source location, inter-organisational environments, expressive languages, Ponder, Java security architecture, Java, Internet, specification languages, security policies, signature, distributed programming, Internet applications, authorisation, declarative language, technology diffusion, dynamic loading
1Dale M. Johnson, Lee A. Benzinger Layering Boundary Protections: An Experiment in Information Assurance. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DARPA Information Assurance Program, boundary protection layering, attack protection, experiment, security of data, data security, client-server systems, client server system, data privacy, data confidentiality
1Konstantin Knorr Dynamic Access Control through Petri Net Workflows. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Petri net workflows, access control matrix, privileges, data misuse, Petri nets, information systems, information systems, authorisation, workflow management software, protection mechanism, dynamic access control
1Michael J. Petkac, Lee Badger Security Agility in Response to Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security agility, cooperative frameworks, malicious attacks, mission critical functionality, security policy reconfiguration, runtime security policy change, prototype toolkit, flexible host-based response, distributed systems, intrusion detection, distributed processing, software components, security of data
1Holger Vogt, Henning Pagnia, Felix C. Gärtner Modular Fair Exchange Protocols for Electronic Commerce. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Distributed Computing, Electronic Commerce, Fair Exchange, Protocol Design, Protocol Composition
1John G. Brainard SecurSight: An Architecture for Secure Information Access. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF authentication, architecture, authorization, PKI
1Charles N. Payne, D. J. Thomsen, J. Bogle, Richard C. O'Brien Napoleon: A Recipe for Workflow. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF workflow, role-based access control, security policy, distributed system security
1John P. McDermott, Chris Fox Using Abuse Case Models for Security Requirements Analysis. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security, UML, requirements, use case
1David A. Cooper A Model of Certificate Revocation. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF certificate revocation, certification authority, CRL, certificate revocation list
1Marco Prandini Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, Enrique Areizaga, Juàn Manuel Mateos Secure Communications in ATM Networks. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Olivier Paul, Maryline Laurent, Sylvain Gombault An Asynchronous Distributed Access Control Architecture for IP over ATM Networks. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Security, Access Control, Agents, ATM, Management, IP-over-ATM
1Heather M. Hinton, Crispin Cowan, Lois M. L. Delcambre, Shawn Bowers SAM: Security Adaptation Manager . Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Shabnam Erfani, C. Sekar Chandersekaran Generic Support for PKIX Certificate Management in CDSA. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF CDSA, PKIX, Certificate management, architecture
1Arthur D. Friedman, Ellie Padgett, Mark Rasch, Scott Charney, John Thomas Legal and Technical Responses to Protecting the U. S. Critical Infrastructures (Panel). Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Cynthia E. Irvine, Timothy E. Levin Toward a Taxonomy and Costing Method for Security Services. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security cost, quality of security service, network security service, security taxonomy, resource management system
1John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi Security Policy Coordination for Heterogeneous Information Systems. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF information enclaves, access control, mediators, authorization policy
1Ravi S. Sandhu, Qamar Munawer The ARBAC99 Model for Administration of Roles. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Arianna Arona, Danilo Bruschi, Emilia Rosti Adding Availability to Log Services of Untrusted Machines. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security, fault-tolerance, availability, log files
1Marcus Oestreicher Transactions in Java Card. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Transactions, Smartcard, Java Card
1Nittida Nuansri, Samar Singh, Tharam S. Dillon A Process State-Transition Analysis and Its Application to Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jared Karro, Jie Wang 0002 Towards a Practical, Secure, and Very Large Scale Online Election. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Online Election
1Pietro Iglio TrustedBox: A Kernel-Level Integrity Checker. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF integrity checker
1Ross J. Anderson How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering). Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Chris Sinclair, Lyn Pierce, Sara Matzner An Application of Machine Learning to Network Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Charlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers User Authentication and Authorization in the Java(tm) Platform. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Mahesh V. Tripunitara, Partha Dutta A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Tim Wilkinson, Dave Hearn, Simon R. Wiseman Trustworthy Access Control with Untrustworthy Web Servers. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF access control, web, encryption
1Susan Hinrichs Policy-Based Management: Bridging the Gap. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Stephen H. Brackin Using Checkable Types in Automatic Protocol Analysis. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Formal Methods, Cryptographic Protocols, Automatic Analysis
1Amgad Fayad, Sushil Jajodia, Catherine D. McCollum Application-Level Isolation Using Data Inconsistency Detection. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Security, databases, Intrusion Detection, Isolation, Information Warfare
1Myong H. Kang, Brian J. Eppinger, Judith N. Froscher Tools to Support Secure Enterprise Computing. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Security, Workflow, Tool, Enterprise computing
1Selwyn Russell Fast Checking of Individual Certificate Revocation on Small Systems. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Michael Wichert, David B. Ingham, Steve J. Caughey Non-repudiation Evidence Generation for CORBA using XML. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Security, XML, e-commerce, CORBA, non-repudiation
1André L. M. dos Santos, Richard A. Kemmerer Safe Areas of Computation for Secure Computing with Insecure Applications. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Carsten Benecke A Parallel Packet Screen for High Speed Networks. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Packet Screen, Parallel Processing, Firewall, High Speed Networks
1Konstantin Beznosov, Yi Deng 0001, Bob Blakley 0001, Carol C. Burt, John F. Barkley A Resource Access Decision Service for CORBA-Based Distributed Systems. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF distributed systems, Access control, CORBA, computer security, RAD
1Richard E. Newman, Mark V. Hoyt, Tim Swanson, Phillipe Broccard, Mark Sanders, Joe Winner Design of LAN-Lock, A System for Securing Wireless Networks. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Richard B. Neely Security Architecture Development and Results for a Distributed Modeling and Simulation System . Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF information security, modeling and simulation, security architecture, accreditation
1Wenliang Du, Praerit Garg, Aditya P. Mathur Security Relevancy Analysis on the Registry of Windows NT 4.0. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Alexander W. Röhm, Gaby Herrmann, Günther Pernul A Language for Modeling Secure Business Transactions. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF bussiness transactions, modeling security, electronic commerce, electronic markets
1Ron Ross, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Blaine Burnham, Rayford B. Vaughn Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Douglas L. Long, Julie Baker, Francis Fung A Prototype Secure Workflow Server. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF workflow, security policy
1James Kirby, Myla Archer, Constance L. Heitmeyer SCR: A Practical Approach to Building a High Assurance COMSEC System. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Rolf Oppliger, Andreas Greulich, Peter Trachsel A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF certification authority (CA), Public key cryptography, public key infrastructure (PKI), public key certificate
1Jeremy Epstein Architecture and Concepts of the ARGuE Guard. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  BibTeX  RDF
1Stephen M. Matyas, Allen Roginsky An Effective Defense Against First Party Attacks in Public-Key Algorithms. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Encryption, Hash function, Public key
1Chang N. Zhang, Ming Y. Deng, Ralph Mason Two Improved Algorithms and Hardware Implementations for Key Distribution Using Extended Programmable Cellular Automata. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Alexander W. Röhm, Günther Pernul, Gaby Herrmann Modeling Secure and Fair Electronic Commerce. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Vesna Hassler, O. Then Controlling Applets' Behavior in a Browser. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Jared Karro, Jie Wang 0002 Protecting Web Servers from Security Holes in Server-Side Includes. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Edward Amoroso, R. Kwapniewski Selection Criteria for Intrusion Detection Systems. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Qamar Munawer The RRA97 Model for Role-Based Administration of Role Hierarchies. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Kathrin Schier Multifunctional Smart Cards for Electronic Commerce-Application of the Role and Task-Based Security Model. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1 14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  BibTeX  RDF
1Yi Mu 0001, Vijay Varadharajan Anonymous Secure E-Voting Over a Network. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Pietro Iglio, Fausto Fraticelli, Luigi Giuri Rule-Based Filtering for Java Applets. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni An Architecture for Intrusion Detection Using Autonomous Agents. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Bryony Pomeroy, Simon R. Wiseman Private Desktops and Shared Store. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Tasneem G. Brutch, Paul C. Brutch Mutual Authentication, Confidentiality, and Key Management (MACKMAN) System for Mobile Computing and Wireless Communication. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Roger Wright, David J. Shifflett, Cynthia E. Irvine Security Architecture for a Virtual Heterogeneous Machine. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Michael Clifford, C. Lavine, Matt Bishop The Solar Trust Model: Authentication Without Limitation. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Quazi N. Ahmed, Susan V. Vrbsky Maintaining Security in Firm Real-Time Database Systems. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Michiharu Kudo Electronic Submission Protocol Based on Temporal Accountability. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Lucas C. Ferreira, Ricardo Dahab A Scheme for Analyzing Electronic Payment Systems. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1D. J. Thomsen, D. O'Brien, J. Bogle Role-Based Access Control Framework for Network Enterprises. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Herbert Leitold, Udo Payer, Reinhard Posch A Hardware-Independent Encryption Model for ATM Devices. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1George F. Jelen, Jeffrey R. Williams A Practical Approach to Measuring Assurance. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan, Chris Crall, Joe Pato Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Bruce Schneier, James Riordan A Certified E-Mail Protocol. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1P. C. Hyland, Ravi S. Sandhu Concentric Supervision of Security Applications: A New Security Management Paradigm. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Anup K. Ghosh, James Wanken, Frank Charron Detecting Anomalous and Unknown Intrusions Against Programs. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Yuh-Min Tseng, Jinn-ke Jan ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Roland Büschkes, Dogan Kesdogan, Peter Reichl How to Increase Security in Mobile Networks by Anomaly Detection. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Mourad Debbabi, Y. Legaré, Mohamed Mejri An Environment for the Specification and Analysis of Cryptoprotocols. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Giovanni Vigna, Richard A. Kemmerer NetSTAT: A Network-Based Intrusion Detection Approach. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Reiner Sailer Security Services in an Open Service Environment. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1M. A. Bahie-Eldin, A. A. Omar Complexity Measure of Encryption Keys Used for Securing Computer Networks. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Peng Liu 0005, Catherine D. McCollum Application-Level Isolation to Cope with Malicious Database Users. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Rajan Shankaran, Vijay Varadharajan Secure Signaling and Access Control for ATM Networks. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Myong H. Kang, Judith N. Froscher, Brian J. Eppinger Towards an Infrastructure for MLS Distributed Computing. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1F. C. Smith, D. J. Bailey Wachet auf! Computer Security and the Millenium. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1D. Endler Intrusion Detection Applying Machine Learning to Solaris Audit Data. Search on Bibsonomy ACSAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1James W. Freeman, T. C. Darr, Richard B. Neely Risk Assessment for Large Heterogeneous Systems. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security risk assessment process, large heterogeneous systems, C/sup 4/I systems, weapon systems, subsystem-level approaches, risk assessment resource allocation, hybrid top-down system-wide approach, guided top-down approach, approval-to-operate decision, security of data, decision makers
1Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan Secure and Efficient Digital Coins. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF digital coins, electronic cash systems, complex online computations, payment phase, off-line anonymous cash scheme, payment transactions, unconditional client anonymity, double-spending detection, coin forgery, framing attacks, security, efficiency, EFTS
1Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz An Architecture for Multilevel Secure Interoperability. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF multilevel secure interoperability architecture, commercial sector, cost effective high assurance multilevel security, small communities, high assurance secure solution, MLS architecture, commercial single level hardware, specialized security devices, MLS CORBA, NRL Pump, Starlight Interactive Link, MLS cooperative computing, distributed computing, standards, distributed processing, heterogeneous environments, computer systems, COTS components, security levels
1Kymie M. C. Tan, Blair R. Collie Detection and Classification of TCP/IP Network Services. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF TCP/IP network service classification, computer intruders, remote terminal software, undetectable access, system audit, intruder activity detection, unauthorised network services, network connection signature, neural network, learning, monitoring, experiment, transport protocols, data security, network traffic, generalisation, Australia, law enforcement
1Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan Micro-Digital Money for Electronic Commerce. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF micro-digital money, cash-based micropayment schemes, double-locked hash chain technique, digital coin divisibility, digital coin transferability, coin chain, vendor, multiple chains, micropayment transactions, electronic commerce, EFTS
1Chris Hall, Bruce Schneier Remote Electronic Gambling. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF remote electronic gambling, casino games, random bit generation, random permutation generation, player/player collusions, player/dealer collusions, secure audit trail, debt payment, security, Internet, Internet, fairness, public key cryptography
1George M. Mohay, J. Zellers Kernel and Shell-Based Applications Integrity Assurance. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues
1Yung-Cheng Lee, Chi-Sung Laih On the Key Recovery of the Key Escrow System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy
1Dan Thompson, M. Denz Incremental Assurance for Multilevel Applications. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF incremental assurance approach, multilevel applications, high assurance database, economics, costs, security of data, data security, multilevel database
1T. Lowman, D. Mosier Applying the DOD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architecture. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF DoD goal security architecture, enterprise security architectures, Department of Defense Goal Security Architecture, knowledgeable security professionals, enterprise information system security profiles, multiple organizations, multiple program types, security tasks, military computing, security assessments, structured approach
1T. Mitchem, R. Lu, R. O'Brian Using Kernel Hypervisors to Secure Applications. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF kernel hypervisors, secure applications, selective control, loadable module, unbypassable security wrappers, application specific security requirements, client kernel hypervisors, application specific policies, loadable modules, user systems, malicious active content, wrapping servers, firewall services, Web browser, operating system kernels, Linux kernel, COTS components, replication services
1Bruce Schneier, Chris Hall An Improved E-Mail Security Protocol. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy
Displaying result #1301 - #1400 of 1667 (100 per page; Change: )
Pages: [<<][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license