The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Nathanael Paul, Andrew S. Tanenbaum The Design of a Trustworthy Voting System. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha Godiyal, Samuel T. King, Hai D. Nguyen MAVMM: Lightweight and Purpose Built VMM for Malware Analysis. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Karsten Nohl, David Evans 0001 Privacy through Noise: A Design Space for Private Identification. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shakeel Butt, Vinod Ganapathy, Michael M. Swift, Chih-Cheng Chang Protecting Commodity Operating System Kernels from Vulnerable Device Drivers. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eric Osterweil, Daniel Massey, Lixia Zhang 0001 Deploying and Monitoring DNS Security (DNSSEC). Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Baris Coskun, Nasir D. Memon Online Sketching of Network Flows for Real-Time Stepping-Stone Detection. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Young Hee Park, Douglas S. Reeves Identification of Bot Commands by Run-Time Execution Monitoring. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 Detecting Software Theft via System Call Based Birthmarks. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan Zhang 0001 HIMA: A Hypervisor-Based Integrity Measurement Agent. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Li Gong Java Security: A Ten Year Retrospective. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xi Xiong, Xiaoqi Jia, Peng Liu 0005 SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick D. McDaniel Semantically Rich Application-Centric Security in Android. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Matt Bishop Reflections on UNIX Vulnerabilities. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohan Dhawan, Vinod Ganapathy Analyzing Information Flow in JavaScript-Based Browser Extensions. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitaman Datta Enabling Secure Secret Sharing in Distributed Online Social Networks. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Guofei Gu, Vinod Yegneswaran, Phillip A. Porras, Jennifer Stoll, Wenke Lee Active Botnet Probing to Identify Obscure Command and Control Channels. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yanjiang Yang, Jianying Zhou 0001, Jian Weng 0001, Feng Bao 0001 A New Approach for Anonymous Password Authentication. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jeremy Epstein A Survey of Vendor Software Assurance Practices. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Brett Stone-Gross, Christopher Kruegel, Kevin C. Almeroth, Andreas Moser, Engin Kirda FIRE: FInding Rogue nEtworks. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter G. Neumann Computer-Related Risk Futures. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hua Wang, Yao Guo 0001, Xiangqun Chen FPValidator: Validating Type Equivalence of Function Pointers on the Fly. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xuquan Lin, Melody Moh, Teng-Sheng Moh On energy-efficient semi-asynchronous MAC protocols for multi-hop ad-hoc networks. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Bo Mao, Dan Feng 0001, Suzhen Wu, Jianxi Chen, Lingfang Zeng, Lei Tian 0001 RAID10L: A high performance RAID10 storage architecture based on logging technique. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mladen Nikitovic, Thomas De Schampheleire, Mats Brorsson A study on periodic shutdown for adaptive CMPs in handheld devices. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jin-Gu Kang, Seungwon Yang, Jong-Yeol Lee Debugging of assembly library functions without target debugging tools. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Hyuntae Cho, Sanghyun Son 0001, Yunju Baek Implementation of a precision time protocol over low rate wireless personal area networks. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sun-Yuan Hsieh, Nai-Wen Chang 0002 A new approach for cycle embedding in faulty hypercubes. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jie Cai, Alistair P. Rendell, Peter E. Strazdins, H'sien J. Wong Performance models for Cluster-enabled OpenMP implementations. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Chia-Yi Liou, Herming Chiueh An ALU cluster with floating point unit for media streaming architecture with homogeneous processor cores. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jih-Ching Chiu, Yu-Liang Chou, Ta-Li Yeh, Tseng-Kuei Lin Designs of the basic block reassembling Instruction Stream Buffer for X86 ISA. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yi He 0008, Ju Ren 0002, Qianming Yang, Mei Wen, Nan Wu 0003, Chunyuan Zhang FPGA-based Equivalent Simulation Technology (FEST) for clustered stream architecture. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Guiming Wu, Jinhui Xu 0002, Yong Dou, Miao Wang Computation rotating for data reuse. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Chris R. Jesshope, Alexander V. Shafarenko Concurrency engineering. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shaoshan Liu, Jean-Luc Gaudiot The potential of fine-grained value prediction in enhancing the performance of modern parallel machines. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1P. Varalakshmi, S. Thamarai Selvi, K. Anitha Devi, C. Krithika, R. M. Kundhavai Quiz-based trust model with optimized resource management in grid. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jenq-Haur Wang, Chun-Yi Tsai, Tzao-Lin Lee DHCP support for secure automatic detection of host status. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mikael Collin, Mats Brorsson Improving code density of embedded software using a 2-level dictionary code compression architecture. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Joshua LeVasseur, Volkmar Uhlig, Yaowei Yang, Matthew Chapman, Peter Chubb, Ben Leslie, Gernot Heiser Pre-virtualization: Soft layering for virtual machines. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Avinash Malik, Zoran Salcic, Partha S. Roop Tandem virtual machine - An efficient execution platform for GALS language SystemJ. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yaw-Jen Lin, Mei-Ju Su, Heng-Shuen Chen, Chiou-I Lin A study of integrating digital health network with UPnP in an elderly nursing home. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Chuanyi Liu, Dapeng Ju, Yu Gu 0005, Youhui Zhang, Dongsheng Wang 0002, David H. C. Du Semantic Data De-duplication for archival storage systems. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Neng-Chung Wang, Yi-Ping Hung Hamiltonian-cycle-based multicasting on wormhole-routed torus networks. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Youhui Zhang, Xiaoling Wang, Liang Hong, Gelin Su, Dongsheng Wang 0002 Portable desktop applications based on user-level virtualization. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Naoto Fukumoto, Tomonobu Mihara, Koji Inoue, Kazuaki J. Murakami Analyzing the impact of data prefetching on Chip MultiProcessors. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Chao-Tung Yang, Yao-Chun Chi, Ming-Feng Yang, Ching-Hsien Hsu An Anticipative Recursively-Adjusting Mechanism for redundant parallel file transfer in data grids. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shun-Chieh Chang, W. Y. Li, Yuan-Jung Kuo, Chung-Ping Chung Early load: Hiding load latency in deep pipeline processor. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Baekjae Sung, Sejin Park, Woojoong Lee, Chanik Park Enhancing robustness of an iSCSI-based file system in wireless networks. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yung-Chung Ku, Shann-Chiuen Wu WAN services lookup protocol. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Guan-Ying Chiu, Hui-Chin Yang, Walter Yuan-Hwa Li, Chung-Ping Chung Mechanism for return stack and branch history corrections under misprediction in deep pipeline design. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1 13th Asia-Pacific Computer Systems Architecture Conference, ACSAC 2008, Hsinchu, China, August 4-6, 2008 Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  BibTeX  RDF
1Jih-Sheng Shen, Pao-Ann Hsiung, Kuei-Chung Chang A novel spatio-temporal adaptive bus encoding for reducing crosstalk interferences with trade-offs between performance and reliability. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Tomoaki Ukezono, Kiyofumi Tanaka Dynamic binary code translation for data prefetch optimization. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Guang Xu, Hong An, Ming Cong, Fang Wang, Yongqing Ren A wire delay scalable stream processor architecture. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wei-Lun Huang, Tzao-Lin Lee, Chiao Szu Liao Desktop search in the intranet with integrated desktop search engines. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wann-Yun Shieh, Hsin-Dar Chen Saving register-file static power by monitoring short-lived temporary-values in ROB. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xiaohui Liang, Zhiying He, Xiaoxiao Wu A collaborative virtual assembly system based on mobile devices. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shilei Kuang, Robert Elz, Sinchai Kamolphiwong Investigating Enhanced Route Optimization for Mobile IPv6. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jong-Suk Ruth Lee, Hae-Duck Joshua Jeong Quality improvement of sequential steady-state simulations for telecommunication networks. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wei Zhang, Yibo Xue, Dongsheng Wang 0002, Tian Song A multiple simple regular expression matching architecture and coprocessor for deep packet inspection. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mei-Wen Huang, Hsu-Jung Liu, Wen-Shyong Hsieh A Hybrid protocol for Cluster-based wireless sensor networks. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Chen Liu 0001, Jean-Luc Gaudiot Resource sharing control in Simultaneous MultiThreading microarchitectures. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Slo-Li Chu, Min-Jen Lo, Hsiao-Wen Yang MediaMem: A dynamically adjustable memory subsystem for high-bandwidth required multimedia SoC systems. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Chun-Hsian Huang, Pao-Ann Hsiung UML-based hardware/software co-design platform for dynamically partially reconfigurable network security systems. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1San-Chih Lin, Chi-Kuang Chang, Nai-Wei Lin Automatic selection of GCC optimization options using a gene weighted genetic algorithm. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Rui Guo, Hong An, Ruiling Dou, Ming Cong, Yaobin Wang, Qi Li 0034 LogSPoTM: a scalable thread level speculation model based on transactional memory. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Huayong Wang, Rui Hou, Kun Wang Hardware transactional memory system for parallel programming. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ming-Jui Huang, Tzao-Lin Lee An integrated software processor with autofilling out web forms. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Matthew M. Y. Kuo, Sam Collinson, Michael Jäger, John Morris Fast accurate rendering. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jing Zheng, Wenguang Chen, Yurong Chen 0001, Yimin Zhang 0002, Ying Zhao, Weimin Zheng Parallelization of spectral clustering algorithm on multi-core processors and GPGPU. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yang Chen, Bin Fan, Lujie Zhong, Chengyong Wu Diva: A dataflow programming model and its runtime support in Java virtual machine. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Li Wang, Hong An, Yongqing Ren, Yaobin Wang Profile guided optimization for dataflow predication. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kang Yi, Shih-Yang Cheng, Fadi J. Kurdahi, Ahmed M. Eltawil A partial memory protection scheme for higher effective yield of embedded memory for video data. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Cherng-Ying Ing, Tzao-Lin Lee Heterogeneous file sharing by file-system emulation. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Anderson Kuei-An Ku, Jenny Yi-Chun Kuo, Jingling Xue A gather/scatter hardware support for efficient Fast Fourier Transform. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith Defending Against Attacks on Main Memory Persistence. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Timothy W. van der Horst, Kent E. Seamons pwdArmor: Protecting Conventional Password-Based Authentications. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Susanta Nanda, Tzi-cker Chiueh Execution Trace-Driven Automated Attack Signature Generation. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Arati Baliga, Vinod Ganapathy, Liviu Iftode Automatic Inference and Enforcement of Kernel Data Structure Invariants. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001, René Rietz Systematic Signature Engineering by Re-use of Snort Signatures. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 STILL: Exploit Code Detection via Static Taint and Initialization Analyses. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Roberto Perdisci, Andrea Lanzi, Wenke Lee McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Martin Johns, Björn Engelmann 0001, Joachim Posegga XSSDS: Server-Side Detection of Cross-Site Scripting Attacks. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yolanta Beres, Jonathan Griffin, Simon Shiu, Max Heitman, David Markle, Peter Ventura Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Peng Li 0059, Hyundo Park, Debin Gao, Jianming Fu Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Amit Vasudevan MalTRAK: Tracking and Eliminating Unknown Malware. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wang, Xiyang Liu YAGP: Yet Another Graphical Password Strategy. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ahren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor A Survey to Guide Group Key Protocol Development. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Robert J. Cole, Peng Liu Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Timothy Fraser, Matthew R. Evenson, William A. Arbaugh VICI Virtual Machine Introspection for Cognitive Immunity. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Frédéric Massicotte, Yvan Labiche, Lionel C. Briand Toward Automatic Generation of Intrusion Detection Verification Rules. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Barbara Fraser, Stephen D. Crocker Epilogue for RFC 1281, Guidelines for the Secure Operation of the Internet. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ragib Hasan, Marianne Winslett, Richard M. Conlan, Brian Slesinsky, Nandakumar Ramani Please Permit Me: Stateless Delegated Authorization in Mashups. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1William Enck, Patrick D. McDaniel, Trent Jaeger PinUP: Pinning User Files to Known Applications. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Chuan Yue, Haining Wang Anti-Phishing in Offense and Defense. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Günter Karjoth, Andreas Schade, Els Van Herreweghen Implementing ACL-Based Policies in XACML. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1 Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008 Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  BibTeX  RDF
Displaying result #801 - #900 of 1667 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license