Conferences in DBLP
Ross J. Anderson How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering). [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:1-0 [Conf ] Holger Vogt , Henning Pagnia , Felix C. Gärtner Modular Fair Exchange Protocols for Electronic Commerce. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:3-11 [Conf ] Tim Wilkinson , Dave Hearn , Simon R. Wiseman Trustworthy Access Control with Untrustworthy Web Servers. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:12-21 [Conf ] Alexander W. Röhm , Gaby Herrmann , Günther Pernul A Language for Modeling Secure Business Transactions. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:22-0 [Conf ] André L. M. dos Santos , Richard A. Kemmerer Safe Areas of Computation for Secure Computing with Insecure Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:35-44 [Conf ] Jeremy Epstein Architecture and Concepts of the ARGuE Guard. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:45-54 [Conf ] John P. McDermott , Chris Fox Using Abuse Case Models for Security Requirements Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:55-0 [Conf ] Carsten Benecke A Parallel Packet Screen for High Speed Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:67-74 [Conf ] Olivier Paul , Maryline Laurent , Sylvain Gombault An Asynchronous Distributed Access Control Architecture for IP over ATM Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:75-83 [Conf ] Maryline Laurent , Ahmed Bouabdallah , Christophe Delahaye , Herbert Leitold , Reinhard Posch , Enrique Areizaga , Juàn Manuel Mateos Secure Communications in ATM Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:84-0 [Conf ] Stephen H. Brackin Using Checkable Types in Automatic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:99-108 [Conf ] James Kirby , Myla Archer , Constance L. Heitmeyer SCR: A Practical Approach to Building a High Assurance COMSEC System. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:109-118 [Conf ] Amgad Fayad , Sushil Jajodia , Catherine D. McCollum Application-Level Isolation Using Data Inconsistency Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:119-0 [Conf ] Douglas L. Long , Julie Baker , Francis Fung A Prototype Secure Workflow Server. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:129-133 [Conf ] C. Payne , D. J. Thomsen , J. Bogle , Richard C. O'Brien Napoleon: A Recipe for Workflow. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:134-142 [Conf ] Myong H. Kang , Brian J. Eppinger , Judith N. Froscher Tools to Support Secure Enterprise Computing. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:143-0 [Conf ] Stephen M. Matyas , Allen Roginsky An Effective Defense Against First Party Attacks in Public-Key Algorithms. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:155-160 [Conf ] Jared Karro , Jie Wang Towards a Practical, Secure, and Very Large Scale Online Election. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:161-169 [Conf ] Richard E. Newman , Mark V. Hoyt , Tim Swanson , Phillipe Broccard , Mark Sanders , Joe Winner Design of LAN-Lock, A System for Securing Wireless Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:170-0 [Conf ] Cynthia E. Irvine , Timothy E. Levin Toward a Taxonomy and Costing Method for Security Services. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:183-188 [Conf ] Pietro Iglio TrustedBox: A Kernel-Level Integrity Checker. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:189-198 [Conf ] Arianna Arona , Danilo Bruschi , Emilia Rosti Adding Availability to Log Services of Untrusted Machines. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:199-0 [Conf ] Susan Hinrichs Policy-Based Management: Bridging the Gap. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:209-218 [Conf ] John Hale , Pablo Galiasso , Mauricio Papa , Sujeet Shenoi Security Policy Coordination for Heterogeneous Information Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:219-228 [Conf ] Ravi S. Sandhu , Qamar Munawer The ARBAC99 Model for Administration of Roles. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:229-0 [Conf ] Rolf Oppliger , Andreas Greulich , Peter Trachsel A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:241-248 [Conf ] Selwyn Russell Fast Checking of Individual Certificate Revocation on Small Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:249-255 [Conf ] David A. Cooper A Model of Certificate Revocation. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:256-0 [Conf ] Blaine Burnham , Cynthia E. Irvine , Charles Reynolds , Ravi S. Sandhu , Rayford B. Vaughn Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:265-0 [Conf ] Shabnam Erfani , C. Sekar Chandersekaran Generic Support for PKIX Certificate Management in CDSA. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:269-275 [Conf ] Marco Prandini Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:276-0 [Conf ] Charlie Lai , Li Gong , Larry Koved , Anthony J. Nadalin , Roland Schemers User Authentication and Authorization in the Java(tm) Platform. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:285-290 [Conf ] Marcus Oestreicher Transactions in Java Card. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:291-0 [Conf ] Scott Charney , Ellie Padgett , Mark Rasch , John Thomas Legal and Technical Responses to Protecting the U. S. Critical Infrastructures (Panel). [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:299-0 [Conf ] Mahesh V. Tripunitara , Partha Dutta A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:303-309 [Conf ] Konstantin Beznosov , Yi Deng , Bob Blakley , C. Burt , John F. Barkley A Resource Access Decision Service for CORBA-Based Distributed Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:310-319 [Conf ] Michael Wichert , David B. Ingham , Steve J. Caughey Non-repudiation Evidence Generation for CORBA using XML. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:320-0 [Conf ] Wenliang Du , Praerit Garg , Aditya P. Mathur Security Relevancy Analysis on the Registry of Windows NT 4.0. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:331-340 [Conf ] Richard B. Neely Security Architecture Development and Results for a Distributed Modeling and Simulation System . [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:341-348 [Conf ] John G. Brainard SecurSight: An Architecture for Secure Information Access. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:349-0 [Conf ] Heather M. Hinton , Crispin Cowan , Lois M. L. Delcambre , Shawn Bowers SAM: Security Adaptation Manager . [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:361-370 [Conf ] Chris Sinclair , Lyn Pierce , Sara Matzner An Application of Machine Learning to Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:371-377 [Conf ] Nittida Nuansri , Samar Singh , Tharam S. Dillon A Process State-Transition Analysis and Its Application to Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:378-388 [Conf ]