|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 738 occurrences of 436 keywords
|
|
|
Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Heejin Jang, Sangwook Kim |
A Self-Extension Monitoring for Security Management. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare |
1 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
1 | Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta |
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
interoperable security infrastructure, AT? Labs, multiple certificate authorities, third-party CA systems, uniform enrollment procedures, Verisign, authenticated IP services, policy descriptions, certificate sources, X.509v3 certificates, CRML, PKCS, X509, XML, software architecture, authentication, public key cryptography, certification, client-server systems, public key infrastructure, revocation, intranets, message authentication, CRL, OCSP, middleware platform |
1 | Jaehong Park, Ravi S. Sandhu, J. Schifalacqua |
Security Architectures for Controlled Digital Information Dissemination. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
controlled digital information dissemination, application-level security, use control, control set, distribution style, cryptography, virtual machine, watermarking, security of data, business data processing, information dissemination, security architectures, business, copy protection |
1 | Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman |
A Flexible Access Control Service for Java Mobile Code. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
flexible access control service, Java mobile code, remote servers, distributed heterogeneous clients, foreign code execution, host node protection, code protection, sandbox model, downloaded code, source location, inter-organisational environments, expressive languages, Ponder, Java security architecture, Java, Internet, specification languages, security policies, signature, distributed programming, Internet applications, authorisation, declarative language, technology diffusion, dynamic loading |
1 | Dale M. Johnson, Lee A. Benzinger |
Layering Boundary Protections: An Experiment in Information Assurance. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
DARPA Information Assurance Program, boundary protection layering, attack protection, experiment, security of data, data security, client-server systems, client server system, data privacy, data confidentiality |
1 | Konstantin Knorr |
Dynamic Access Control through Petri Net Workflows. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
Petri net workflows, access control matrix, privileges, data misuse, Petri nets, information systems, information systems, authorisation, workflow management software, protection mechanism, dynamic access control |
1 | Michael J. Petkac, Lee Badger |
Security Agility in Response to Intrusion Detection. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
security agility, cooperative frameworks, malicious attacks, mission critical functionality, security policy reconfiguration, runtime security policy change, prototype toolkit, flexible host-based response, distributed systems, intrusion detection, distributed processing, software components, security of data |
1 | Holger Vogt, Henning Pagnia, Felix C. Gärtner |
Modular Fair Exchange Protocols for Electronic Commerce. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Distributed Computing, Electronic Commerce, Fair Exchange, Protocol Design, Protocol Composition |
1 | John G. Brainard |
SecurSight: An Architecture for Secure Information Access. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
authentication, architecture, authorization, PKI |
1 | Charles N. Payne, D. J. Thomsen, J. Bogle, Richard C. O'Brien |
Napoleon: A Recipe for Workflow. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
workflow, role-based access control, security policy, distributed system security |
1 | John P. McDermott, Chris Fox |
Using Abuse Case Models for Security Requirements Analysis. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
security, UML, requirements, use case |
1 | David A. Cooper |
A Model of Certificate Revocation. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
certificate revocation, certification authority, CRL, certificate revocation list |
1 | Marco Prandini |
Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, Enrique Areizaga, Juàn Manuel Mateos |
Secure Communications in ATM Networks. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Paul, Maryline Laurent, Sylvain Gombault |
An Asynchronous Distributed Access Control Architecture for IP over ATM Networks. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Security, Access Control, Agents, ATM, Management, IP-over-ATM |
1 | Heather M. Hinton, Crispin Cowan, Lois M. L. Delcambre, Shawn Bowers |
SAM: Security Adaptation Manager . |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Shabnam Erfani, C. Sekar Chandersekaran |
Generic Support for PKIX Certificate Management in CDSA. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
CDSA, PKIX, Certificate management, architecture |
1 | Arthur D. Friedman, Ellie Padgett, Mark Rasch, Scott Charney, John Thomas |
Legal and Technical Responses to Protecting the U. S. Critical Infrastructures (Panel). |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia E. Irvine, Timothy E. Levin |
Toward a Taxonomy and Costing Method for Security Services. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
security cost, quality of security service, network security service, security taxonomy, resource management system |
1 | John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi |
Security Policy Coordination for Heterogeneous Information Systems. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
information enclaves, access control, mediators, authorization policy |
1 | Ravi S. Sandhu, Qamar Munawer |
The ARBAC99 Model for Administration of Roles. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Arianna Arona, Danilo Bruschi, Emilia Rosti |
Adding Availability to Log Services of Untrusted Machines. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
security, fault-tolerance, availability, log files |
1 | Marcus Oestreicher |
Transactions in Java Card. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Transactions, Smartcard, Java Card |
1 | Nittida Nuansri, Samar Singh, Tharam S. Dillon |
A Process State-Transition Analysis and Its Application to Intrusion Detection. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Jared Karro, Jie Wang 0002 |
Towards a Practical, Secure, and Very Large Scale Online Election. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Online Election |
1 | Pietro Iglio |
TrustedBox: A Kernel-Level Integrity Checker. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
integrity checker |
1 | Ross J. Anderson |
How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering). |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Chris Sinclair, Lyn Pierce, Sara Matzner |
An Application of Machine Learning to Network Intrusion Detection. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Charlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers |
User Authentication and Authorization in the Java(tm) Platform. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Mahesh V. Tripunitara, Partha Dutta |
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Tim Wilkinson, Dave Hearn, Simon R. Wiseman |
Trustworthy Access Control with Untrustworthy Web Servers. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
access control, web, encryption |
1 | Susan Hinrichs |
Policy-Based Management: Bridging the Gap. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Stephen H. Brackin |
Using Checkable Types in Automatic Protocol Analysis. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Formal Methods, Cryptographic Protocols, Automatic Analysis |
1 | Amgad Fayad, Sushil Jajodia, Catherine D. McCollum |
Application-Level Isolation Using Data Inconsistency Detection. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Security, databases, Intrusion Detection, Isolation, Information Warfare |
1 | Myong H. Kang, Brian J. Eppinger, Judith N. Froscher |
Tools to Support Secure Enterprise Computing. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Security, Workflow, Tool, Enterprise computing |
1 | Selwyn Russell |
Fast Checking of Individual Certificate Revocation on Small Systems. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Michael Wichert, David B. Ingham, Steve J. Caughey |
Non-repudiation Evidence Generation for CORBA using XML. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Security, XML, e-commerce, CORBA, non-repudiation |
1 | André L. M. dos Santos, Richard A. Kemmerer |
Safe Areas of Computation for Secure Computing with Insecure Applications. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Benecke |
A Parallel Packet Screen for High Speed Networks. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Packet Screen, Parallel Processing, Firewall, High Speed Networks |
1 | Konstantin Beznosov, Yi Deng 0001, Bob Blakley 0001, Carol C. Burt, John F. Barkley |
A Resource Access Decision Service for CORBA-Based Distributed Systems. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
distributed systems, Access control, CORBA, computer security, RAD |
1 | Richard E. Newman, Mark V. Hoyt, Tim Swanson, Phillipe Broccard, Mark Sanders, Joe Winner |
Design of LAN-Lock, A System for Securing Wireless Networks. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Richard B. Neely |
Security Architecture Development and Results for a Distributed Modeling and Simulation System . |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
information security, modeling and simulation, security architecture, accreditation |
1 | Wenliang Du, Praerit Garg, Aditya P. Mathur |
Security Relevancy Analysis on the Registry of Windows NT 4.0. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Alexander W. Röhm, Gaby Herrmann, Günther Pernul |
A Language for Modeling Secure Business Transactions. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
bussiness transactions, modeling security, electronic commerce, electronic markets |
1 | Ron Ross, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Blaine Burnham, Rayford B. Vaughn |
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Douglas L. Long, Julie Baker, Francis Fung |
A Prototype Secure Workflow Server. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
workflow, security policy |
1 | James Kirby, Myla Archer, Constance L. Heitmeyer |
SCR: A Practical Approach to Building a High Assurance COMSEC System. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Rolf Oppliger, Andreas Greulich, Peter Trachsel |
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
certification authority (CA), Public key cryptography, public key infrastructure (PKI), public key certificate |
1 | Jeremy Epstein |
Architecture and Concepts of the ARGuE Guard. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | |
15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA |
ACSAC |
1999 |
DBLP BibTeX RDF |
|
1 | Stephen M. Matyas, Allen Roginsky |
An Effective Defense Against First Party Attacks in Public-Key Algorithms. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Encryption, Hash function, Public key |
1 | Chang N. Zhang, Ming Y. Deng, Ralph Mason |
Two Improved Algorithms and Hardware Implementations for Key Distribution Using Extended Programmable Cellular Automata. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Alexander W. Röhm, Günther Pernul, Gaby Herrmann |
Modeling Secure and Fair Electronic Commerce. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Vesna Hassler, O. Then |
Controlling Applets' Behavior in a Browser. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Jared Karro, Jie Wang 0002 |
Protecting Web Servers from Security Holes in Server-Side Includes. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Edward Amoroso, R. Kwapniewski |
Selection Criteria for Intrusion Detection Systems. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Qamar Munawer |
The RRA97 Model for Role-Based Administration of Role Hierarchies. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Kathrin Schier |
Multifunctional Smart Cards for Electronic Commerce-Application of the Role and Task-Based Security Model. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | |
14th Annual Computer Security Applications Conference (ACSAC 1998), 7-11 December 1998, Scottsdale, AZ, USA |
ACSAC |
1998 |
DBLP BibTeX RDF |
|
1 | Yi Mu 0001, Vijay Varadharajan |
Anonymous Secure E-Voting Over a Network. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Pietro Iglio, Fausto Fraticelli, Luigi Giuri |
Rule-Based Filtering for Java Applets. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni |
An Architecture for Intrusion Detection Using Autonomous Agents. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Bryony Pomeroy, Simon R. Wiseman |
Private Desktops and Shared Store. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Tasneem G. Brutch, Paul C. Brutch |
Mutual Authentication, Confidentiality, and Key Management (MACKMAN) System for Mobile Computing and Wireless Communication. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Roger Wright, David J. Shifflett, Cynthia E. Irvine |
Security Architecture for a Virtual Heterogeneous Machine. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Michael Clifford, C. Lavine, Matt Bishop |
The Solar Trust Model: Authentication Without Limitation. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Quazi N. Ahmed, Susan V. Vrbsky |
Maintaining Security in Firm Real-Time Database Systems. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Michiharu Kudo |
Electronic Submission Protocol Based on Temporal Accountability. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Lucas C. Ferreira, Ricardo Dahab |
A Scheme for Analyzing Electronic Payment Systems. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | D. J. Thomsen, D. O'Brien, J. Bogle |
Role-Based Access Control Framework for Network Enterprises. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Herbert Leitold, Udo Payer, Reinhard Posch |
A Hardware-Independent Encryption Model for ATM Devices. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | George F. Jelen, Jeffrey R. Williams |
A Practical Approach to Measuring Assurance. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan, Chris Crall, Joe Pato |
Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Bruce Schneier, James Riordan |
A Certified E-Mail Protocol. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | P. C. Hyland, Ravi S. Sandhu |
Concentric Supervision of Security Applications: A New Security Management Paradigm. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Anup K. Ghosh, James Wanken, Frank Charron |
Detecting Anomalous and Unknown Intrusions Against Programs. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Yuh-Min Tseng, Jinn-ke Jan |
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Roland Büschkes, Dogan Kesdogan, Peter Reichl |
How to Increase Security in Mobile Networks by Anomaly Detection. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Mourad Debbabi, Y. Legaré, Mohamed Mejri |
An Environment for the Specification and Analysis of Cryptoprotocols. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Vigna, Richard A. Kemmerer |
NetSTAT: A Network-Based Intrusion Detection Approach. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Reiner Sailer |
Security Services in an Open Service Environment. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | M. A. Bahie-Eldin, A. A. Omar |
Complexity Measure of Encryption Keys Used for Securing Computer Networks. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Peng Liu 0005, Catherine D. McCollum |
Application-Level Isolation to Cope with Malicious Database Users. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Rajan Shankaran, Vijay Varadharajan |
Secure Signaling and Access Control for ATM Networks. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Myong H. Kang, Judith N. Froscher, Brian J. Eppinger |
Towards an Infrastructure for MLS Distributed Computing. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | F. C. Smith, D. J. Bailey |
Wachet auf! Computer Security and the Millenium. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | D. Endler |
Intrusion Detection Applying Machine Learning to Solaris Audit Data. |
ACSAC |
1998 |
DBLP DOI BibTeX RDF |
|
1 | James W. Freeman, T. C. Darr, Richard B. Neely |
Risk Assessment for Large Heterogeneous Systems. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
security risk assessment process, large heterogeneous systems, C/sup 4/I systems, weapon systems, subsystem-level approaches, risk assessment resource allocation, hybrid top-down system-wide approach, guided top-down approach, approval-to-operate decision, security of data, decision makers |
1 | Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan |
Secure and Efficient Digital Coins. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
digital coins, electronic cash systems, complex online computations, payment phase, off-line anonymous cash scheme, payment transactions, unconditional client anonymity, double-spending detection, coin forgery, framing attacks, security, efficiency, EFTS |
1 | Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz |
An Architecture for Multilevel Secure Interoperability. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
multilevel secure interoperability architecture, commercial sector, cost effective high assurance multilevel security, small communities, high assurance secure solution, MLS architecture, commercial single level hardware, specialized security devices, MLS CORBA, NRL Pump, Starlight Interactive Link, MLS cooperative computing, distributed computing, standards, distributed processing, heterogeneous environments, computer systems, COTS components, security levels |
1 | Kymie M. C. Tan, Blair R. Collie |
Detection and Classification of TCP/IP Network Services. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
TCP/IP network service classification, computer intruders, remote terminal software, undetectable access, system audit, intruder activity detection, unauthorised network services, network connection signature, neural network, learning, monitoring, experiment, transport protocols, data security, network traffic, generalisation, Australia, law enforcement |
1 | Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan |
Micro-Digital Money for Electronic Commerce. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
micro-digital money, cash-based micropayment schemes, double-locked hash chain technique, digital coin divisibility, digital coin transferability, coin chain, vendor, multiple chains, micropayment transactions, electronic commerce, EFTS |
1 | Chris Hall, Bruce Schneier |
Remote Electronic Gambling. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
remote electronic gambling, casino games, random bit generation, random permutation generation, player/player collusions, player/dealer collusions, secure audit trail, debt payment, security, Internet, Internet, fairness, public key cryptography |
1 | George M. Mohay, J. Zellers |
Kernel and Shell-Based Applications Integrity Assurance. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues |
1 | Yung-Cheng Lee, Chi-Sung Laih |
On the Key Recovery of the Key Escrow System. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy |
1 | Dan Thompson, M. Denz |
Incremental Assurance for Multilevel Applications. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
incremental assurance approach, multilevel applications, high assurance database, economics, costs, security of data, data security, multilevel database |
1 | T. Lowman, D. Mosier |
Applying the DOD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architecture. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
DoD goal security architecture, enterprise security architectures, Department of Defense Goal Security Architecture, knowledgeable security professionals, enterprise information system security profiles, multiple organizations, multiple program types, security tasks, military computing, security assessments, structured approach |
1 | T. Mitchem, R. Lu, R. O'Brian |
Using Kernel Hypervisors to Secure Applications. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
kernel hypervisors, secure applications, selective control, loadable module, unbypassable security wrappers, application specific security requirements, client kernel hypervisors, application specific policies, loadable modules, user systems, malicious active content, wrapping servers, firewall services, Web browser, operating system kernels, Linux kernel, COTS components, replication services |
1 | Bruce Schneier, Chris Hall |
An Improved E-Mail Security Protocol. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy |
Displaying result #1301 - #1400 of 1667 (100 per page; Change: ) Pages: [ <<][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ 17][ >>] |
|