|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 738 occurrences of 436 keywords
|
|
|
Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kunihito Yamamori, Toru Abe, Susumu Horiguchi |
Performance Evaluation of a Partial Retraining Scheme for Defective Multi-Layer Neural Networks. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Rajiv A. Ravindran, Rajat Moona |
Retargetable Cache Simulation Using High Level Processor Models. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | K. John Gough |
Stacking them up: a Comparison of Virtual Machines. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Kenji Watanabe, Wanming Chu, Yamin Li |
Exploiting Java Instruction/Thread Level Parallelism with Horizontal Multithreading. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Shu-Lin Hwang, Feipei Lai |
Two Cache Lines Prediction for a Wide-Issue Micro-architecture. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | |
6th Australasian Computer Systems Architecture Conference (ACSAC 2001), 29-30 January 2001, Gold Coast, Queensland, Australia |
ACSAC |
2001 |
DBLP BibTeX RDF |
|
1 | Mohit Aron, Jochen Liedtke, Kevin Elphinstone, Yoonho Park, Trent Jaeger, Luke Deller |
The SawMill Framework for Virtual Memory Diversity. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | David Brodrick, Anwar S. Dawood, Neil W. Bergmann, Melanie Wark |
Error Detection for Adaptive Computing Architectures in Spacecraft Applications. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Pose |
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Chris R. Jesshope |
Implementing an efficient vector instruction set in a chip multi-processor using micro-threaded pipelines. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Antony Edwards, Gernot Heiser |
Components + Security = OS Extensibility. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | G. Hariprakash, R. Achutharaman, Amos Omondi |
DSTRIDE: Data-Cache Miss-Address-Based Stride Prefetching Scheme for Multimedia Processors. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Heui Lee, Paul Becket, Bill Appelbe |
High-Performance Extendable Instruction Set Computing. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Peter K. K. Loh, Heiko Schröder, Wen-Jing Hsu |
Fault-Tolerant Routing on Complete Josephus Cubes. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Neil W. Bergmann, Anwar S. Dawood |
Adaptive Interfacing with Reconfigurable Computers. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Grant B. Wigley, David A. Kearney |
The First Real Operating System for Reconfigurable Computers. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Ernest A. Fardin, Peter Munro, Jarred Scagliotta, John Morris |
A Simulator for High Speed Digital Communications. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Shan Jiang, Sean W. Smith, Kazuhiro Minami |
Securing Web Servers against Insider Attack . |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | D. W. Gresty, Qi Shi 0001, Madjid Merabti |
Requirements for a General Framework for Response to Distributed Denial-of-Service. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati |
A Component-Based Architecture for Secure Data Publication. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Wayne A. Jansen |
Determining Privileges of Mobile Agents. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan |
The Performance Measurement of Cryptographic Primitives on Palm Devices. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Peng Liu 0005 |
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
Database Security, Intrusion Tolerance, Isolation |
1 | Stephen D. Wolthusen |
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Albert Levi, Çetin Kaya Koç |
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Anna Entrichel, James Bergman, Jason Willis, Herb Little |
Computing Without Wires (Or Even a Net): The Pitfalls, Potentials, and Practicality of Wireless Networking. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Paul Ashley, Heather M. Hinton, Mark Vandenwauver |
Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | John C. Munson, Scott Wimer |
Watcher: The Missing Piece of the Security Puzzle. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Cuppens |
Managing Alerts in a Multi-Intrusion Detection Environmen. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
IDMEF, cooperative intrusion detection, alert clustering, alert merging, IDS, DTD |
1 | Ronald Mraz |
Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Germano Caronni, Christoph L. Schuba |
Enabling Hierarchical and Bulk-Distribution for Watermarked Content. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Ross J. Anderson |
Why Information Security is Hard-An Economic Perspective. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Anita K. Jones, Yu Lin |
Application Intrusion Detection using Language Library Calls. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | |
17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA |
ACSAC |
2001 |
DBLP BibTeX RDF |
|
1 | Anita Jones, Song Li |
Temporal Signatures for Intrusion Detection. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
application intrusion detection, temporal signature, security |
1 | John E. Dobson, Brian Randell |
Building Reliable Secure Computing Systems out of Unreliable Insecure Components. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Schaad |
Detecting Conflicts in a Role-Based Delegation Model. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Pete Epstein, Ravi S. Sandhu |
Engineering of Role/Permission Assignments. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Ron Gula, Gene Kim, Chris Klaus, Paul Proctor |
Security Vendor CTOs: Perspectives, Opinions, and Lessons Learned. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | David M. Wheeler, Adam Conyers, Jane Luo, Alex Xiong |
Java Security Extensions for a Java Server in a Hostile Environment. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Eric Monteith |
Genoa TIE, Advanced Boundary Controller Experiment. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | David Mankins, Rajesh Krishnan, Ceilyn Boyd, John Zao, Michael Frentz |
Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Ramaswamy Chandramouli |
A Framework for Multiple Authorization Types in a Healthcare Application System. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Günter Karjoth |
The Authorization Service of Tivoli Policy Director. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | John McHugh |
An Information Flow Tool for Gypsy. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Tim Buchheim, Michael Erlinger, Benjamin S. Feinstein, Gregory A. Matthews, Roy Pollock, Joseph Betser, Andy Walther |
Implementing the Intrusion Detection Exchange Protocol. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Bernd Blobel |
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | John P. McDermott |
Abuse-Case-Based Assurance Arguments. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Ulrich Lang 0001, Dieter Gollmann, Rudolf Schreiner |
Verifiable Identifiers in Middleware Security. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Charles Payne, Tom Markham |
Architecture and Applications for a Distributed Embedded Firewall. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Peter Herrmann |
Information Flow Analysis of Component-Structured Applications. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Klaus Julisch |
Mining Alarm Clusters to Improve Alarm Handling Efficiency. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Matt Bishop, Anup K. Ghosh, James A. Whittaker |
How Useful is Software Fault Injection for Evaluating the Security of COTS Products? |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin S. Feinstein, Gregory A. Matthews, Stuart Staniford, Andy Walther |
Experiences Implementing a Common Format for IDS Alerts. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Nathalie Weiler |
Secure Anonymous Group Infrastructure for Common and Future Internet Applications. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
scalable anonymity, configurable end-to-end anonymous communication, pseudonymous multicast, anonymous group communication |
1 | Victoria Ungureanu |
A Regulated Approach to Certificate Management. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Valentin Razmov, Daniel R. Simon |
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Dan Thomsen |
Introduction to Classic Papers. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Yih Huang, David Rine, Xunhua Wang |
A JCA-Based Implementation Framework for Threshold Cryptography. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Roger R. Schell |
Information Security: Science, Pseudoscience, and Flying Pigs. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Tao Wan, Xue Dong Yang |
IntruDetector: A Software Platform for Testing Network Intrusion Detection Algorithms. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Wenliang Du, Mikhail J. Atallah |
Privacy-Preserving Cooperative Statistical Analysis. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | James M. Hayes |
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean |
A Security Model for Military Message Systems: Retrospective. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
Storage channels, Security, Verification, confinement, message systems |
1 | Ulf Lindqvist, Phillip A. Porras |
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001 |
Introducing Decryption Authority into PKI. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
decryption authority, DA, sensitive messages, asymmetric encryption, Internet, electronic commerce, electronic commerce, digital signature, public key cryptography, public key cryptography, PKI, message authentication, Internet security, telecommunication security, online transactions |
1 | Peter Gutmann |
A Reliable, Scalable General-Purpose Certificate Store. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
general-purpose certificate store, scalability, standards, operating system, software reliability, software reliability, availability, public key cryptography, public key cryptography, PKI, error recovery, authorisation |
1 | Weiliang Zhao, Vijay Varadharajan, Yi Mu 0001 |
Fair On-line Gambling. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
fair on-line gambling, fair electronic gambling scheme, gambling outcome, optimal fair exchange metho, gambling message exchange, off-line Trusted Third Party, Internet, Internet, transaction processing, entertainment, security of data, cheating, payment, financial data processing |
1 | E. Strother |
Denial of Service Protection - The Nozzle. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource |
1 | Eugenio Faldella, Marco Prandini |
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks |
1 | Murat Aydos, Tugrul Yanik, Çetin Kaya Koç |
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications |
1 | Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang |
Experience with Software Watermarking. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
program-transformation attacks, heap-space usage, watermark retrieval time, protection technique, tamperproofing, Java, Java, data structures, security of data, execution times, obfuscation, dynamic data structures, code size, software watermarking, copy protection |
1 | Joon S. Park, Ravi S. Sandhu |
Binding Identities and Attributes using Digitally Signed Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
binding identities, digitally signed certificates, binding attributes, chained signatures, monolithic signatures, autonomic signatures, digital signature, certification, message authentication, certificate authority, attribute certificates |
1 | John Viega, J. T. Bloch, Y. Kohno, Gary McGraw |
ITS4: A Static Vulnerability Scanner for C and C++ Code. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
ITS4, static vulnerability scanner, C++ code, security-critical source code, real-time feedback, e-commerce software, software tools, security of data, software packages, software package, C language, software vulnerabilities, C++ language, C code |
1 | Michael A. Schneider, Edward W. Felten |
Efficient Commerce Protocols based on One-Time Pads. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad |
1 | Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine |
Enabling Secure On-Line DNS Dynamic Update. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
secure online DNS dynamic update, Internet Engineering Task Force, DNS Security Extension, zone security key, role separation principle, signature computation time, Internet, authentication, cryptography, distributed databases, RSA, transport protocols, experimental results, message authentication, threshold cryptography, telecommunication security, MD5, Domain Name System, IP addresses, performance penalty, DNSSEC |
1 | Ezedin Barka, Ravi S. Sandhu |
Framework for Role-based Delegation Models. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
role-based delegation models, authorisation |
1 | E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine |
Calculating Costs for Quality of Security Service. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
security service quality, security information storage, security information retrieval, task security model, variant security service invocation, dynamic network modes, abstract security level choices, resource utilization costs, efficient task schedule estimation, research prototype, scheduling, quality of service, information retrieval, scalability, computer networks, costing, costing, security of data, system integration, telecommunication security, information storage, resource management system |
1 | Jeff Hayes |
Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Epstein, L. Thomas, Eric Monteith |
Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
operating system wrappers, commercial firewalls, fine grained control, application proxy firewalls, experiments, computer networks, network operating systems, authorisation, telecommunication security, applications software, malicious software |
1 | Ian Brown, B. Laurie |
Security Against Compelled Disclosure. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
compelled disclosure, confidential information, government agencies, national economic security, organised crime, information assets, ethics, security of data, data security, data privacy, telecommunication security, legislation, legislation, organisations, computer crime, communication security |
1 | Reiner Sailer, Matthias Kabatnik |
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
history-based distributed filtering, network-level access control, nondiscretionary access control model, data packet exchange, subversive channels, secrecy requirements, trustworthiness validation, data integrity, data integrity, tagging, packet switching, data communication, authorisation, electronic data interchange, telecommunication security, data transmission, context information, telecommunication network management, security levels, state information, security labels, subnetworks |
1 | Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell |
Secure Smart Homes using Jini and UIUC SESAME. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
secure smart homes, dynamically configurable consumer devices, distributed security mechanism, Tiny SESAME, distributed devices, Java, Java, access control, distributed processing, public key cryptography, public key cryptography, handheld devices, authorisation, Jini, component-based software, home automation, Kerberos, access rights, Sun Microsystems, smart devices |
1 | Margus Freudenthal, Sven Heiberg, Jan Willemson |
Personal Security Environment on Palm PDA. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
personal security environment, Palm PDA, secret signing key, mobile computing device, smart-card reader, mobile security applications, device selection, private key handling, mobile computing, personal digital assistant, smart cards, personal computing, message authentication, microcomputer applications, digital signature schemes, design issues, notebook computers |
1 | André L. M. dos Santos, Richard A. Kemmerer |
Implementing Security Policies using the Safe Areas of Computation Approach. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
Safe Areas of Computation approach, business costs, SAC approach, Internet, Internet, World Wide Web, digital libraries, digital libraries, security policies, authorisation, information resources, telecommunication security, bank data processing, access control lists, online banks |
1 | Germano Caronni, Sandeep Kumar, Christoph L. Schuba, Glenn Scott |
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky |
A Policy-based Access Control Mechanism for the Corporate Web. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
policy-based access control mechanism, corporate Web, security problems, management problems, corporate intranet, formal statement, policy engines, business data processing, authorisation, intranets, intranets, access control lists |
1 | Thomas E. Daniels, Eugene H. Spafford |
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
network audit system, NASHID, operating system audit trails, low-level network attacks, application sources, network protocol stack, audit data, audit data accumulation, Linux, Unix, security of data, auditing, network operating systems, computer network management, system calls, host-based intrusion detection |
1 | Chenxi Wang, John C. Knight, Matthew C. Elder |
On Computer Viral Infection and the Effect of Immunization. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
anti-virus systems, virus protection schemes, computer networks, simulation study, telecommunication security, computer network security, computer viruses, computer viruses, immunization |
1 | P. C. Clark, M. C. Meissner, K. O. Vance |
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
secure compartmented data access, untrusted network, COTS-based architecture, secure network computing architecture, application-level firewalls, DoD applications, software architecture, access control, electronic commerce, computer networks, authorisation, telecommunication security, electronic business, military computing, military applications, sensitive information, commercial-off-the-shelf products, sensitive data |
1 | Christoph C. Michael, Anup K. Ghosh |
Two State-based Approaches to Program-based Anomaly Detection. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
state-based approaches, program-based anomaly detection, intrusion detection algorithms, execution audit data, statistical deviation monitoring, finite state machines, finite-state machine, security of data, software performance evaluation, experimental results, auditing, n-grams, algorithm performance |
1 | |
16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA |
ACSAC |
2000 |
DBLP BibTeX RDF |
|
1 | Kai Rannenberg, Giovanni Iachello |
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity |
1 | Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu |
Policy Mediation for Multi-Enterprise Environments. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
policy mediation, multi-enterprise environments, uniform security services, heterogeneous information networks, access control policy management, large enterprise information networks, Policy Machine, Policy Mediation Architecture, software architecture, middleware, static analysis, business data processing, authorisation, information networks, formal techniques, software infrastructures |
1 | Johann Großschädl |
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency |
1 | Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean |
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture |
1 | Pierre Bieber, D. Raujol, Pierre Siron |
Security Architecture for Federated Cooperative Information Systems. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
federated cooperative information systems, role-based policy, software architecture, interoperability, CORBA, distributed databases, case study, open systems, security of data, security architecture, distributed object management, commercial off the shelf components |
1 | Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti |
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
system offensiveness, liability problem, intranet security, security tools performance, distributed tools, Internet, Internet, network security, security of data, security architectures, computer network management, security attacks, DoS attacks |
1 | John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi |
Extending Java for Package based Access Control. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
package based access control, programmable security, TBAC, primitive ticket, language translation preprocessor, security service library, ticket management, Java, object-oriented programming, RBAC, MAC, source code, software libraries, syntax, authorisation, program interpreters, DAC, Java language, bytecode interpretation |
1 | Uwe Jendricke, Daniela Gerd tom Markotten |
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
security mechanism usability, protection goals, personal security assistant, security functions configuration, security functionality, user identity selection, inexperienced users, security needs negotiation, Internet, user interfaces, user interface, human factors, Identity-Manager, personal computing, Internet applications, authorisation, telecommunication security |
Displaying result #1201 - #1300 of 1667 (100 per page; Change: ) Pages: [ <<][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ 17][ >>] |
|