The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
1999 (conf/acsac/1999)

  1. Ross J. Anderson
    How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering). [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:1-0 [Conf]
  2. Holger Vogt, Henning Pagnia, Felix C. Gärtner
    Modular Fair Exchange Protocols for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:3-11 [Conf]
  3. Tim Wilkinson, Dave Hearn, Simon R. Wiseman
    Trustworthy Access Control with Untrustworthy Web Servers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:12-21 [Conf]
  4. Alexander W. Röhm, Gaby Herrmann, Günther Pernul
    A Language for Modeling Secure Business Transactions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:22-0 [Conf]
  5. André L. M. dos Santos, Richard A. Kemmerer
    Safe Areas of Computation for Secure Computing with Insecure Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:35-44 [Conf]
  6. Jeremy Epstein
    Architecture and Concepts of the ARGuE Guard. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:45-54 [Conf]
  7. John P. McDermott, Chris Fox
    Using Abuse Case Models for Security Requirements Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:55-0 [Conf]
  8. Carsten Benecke
    A Parallel Packet Screen for High Speed Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:67-74 [Conf]
  9. Olivier Paul, Maryline Laurent, Sylvain Gombault
    An Asynchronous Distributed Access Control Architecture for IP over ATM Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:75-83 [Conf]
  10. Maryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, Enrique Areizaga, Juàn Manuel Mateos
    Secure Communications in ATM Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:84-0 [Conf]
  11. Stephen H. Brackin
    Using Checkable Types in Automatic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:99-108 [Conf]
  12. James Kirby, Myla Archer, Constance L. Heitmeyer
    SCR: A Practical Approach to Building a High Assurance COMSEC System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:109-118 [Conf]
  13. Amgad Fayad, Sushil Jajodia, Catherine D. McCollum
    Application-Level Isolation Using Data Inconsistency Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:119-0 [Conf]
  14. Douglas L. Long, Julie Baker, Francis Fung
    A Prototype Secure Workflow Server. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:129-133 [Conf]
  15. C. Payne, D. J. Thomsen, J. Bogle, Richard C. O'Brien
    Napoleon: A Recipe for Workflow. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:134-142 [Conf]
  16. Myong H. Kang, Brian J. Eppinger, Judith N. Froscher
    Tools to Support Secure Enterprise Computing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:143-0 [Conf]
  17. Stephen M. Matyas, Allen Roginsky
    An Effective Defense Against First Party Attacks in Public-Key Algorithms. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:155-160 [Conf]
  18. Jared Karro, Jie Wang
    Towards a Practical, Secure, and Very Large Scale Online Election. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:161-169 [Conf]
  19. Richard E. Newman, Mark V. Hoyt, Tim Swanson, Phillipe Broccard, Mark Sanders, Joe Winner
    Design of LAN-Lock, A System for Securing Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:170-0 [Conf]
  20. Cynthia E. Irvine, Timothy E. Levin
    Toward a Taxonomy and Costing Method for Security Services. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:183-188 [Conf]
  21. Pietro Iglio
    TrustedBox: A Kernel-Level Integrity Checker. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:189-198 [Conf]
  22. Arianna Arona, Danilo Bruschi, Emilia Rosti
    Adding Availability to Log Services of Untrusted Machines. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:199-0 [Conf]
  23. Susan Hinrichs
    Policy-Based Management: Bridging the Gap. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:209-218 [Conf]
  24. John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi
    Security Policy Coordination for Heterogeneous Information Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:219-228 [Conf]
  25. Ravi S. Sandhu, Qamar Munawer
    The ARBAC99 Model for Administration of Roles. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:229-0 [Conf]
  26. Rolf Oppliger, Andreas Greulich, Peter Trachsel
    A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:241-248 [Conf]
  27. Selwyn Russell
    Fast Checking of Individual Certificate Revocation on Small Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:249-255 [Conf]
  28. David A. Cooper
    A Model of Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:256-0 [Conf]
  29. Blaine Burnham, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Rayford B. Vaughn
    Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:265-0 [Conf]
  30. Shabnam Erfani, C. Sekar Chandersekaran
    Generic Support for PKIX Certificate Management in CDSA. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:269-275 [Conf]
  31. Marco Prandini
    Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:276-0 [Conf]
  32. Charlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers
    User Authentication and Authorization in the Java(tm) Platform. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:285-290 [Conf]
  33. Marcus Oestreicher
    Transactions in Java Card. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:291-0 [Conf]
  34. Scott Charney, Ellie Padgett, Mark Rasch, John Thomas
    Legal and Technical Responses to Protecting the U. S. Critical Infrastructures (Panel). [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:299-0 [Conf]
  35. Mahesh V. Tripunitara, Partha Dutta
    A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:303-309 [Conf]
  36. Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt, John F. Barkley
    A Resource Access Decision Service for CORBA-Based Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:310-319 [Conf]
  37. Michael Wichert, David B. Ingham, Steve J. Caughey
    Non-repudiation Evidence Generation for CORBA using XML. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:320-0 [Conf]
  38. Wenliang Du, Praerit Garg, Aditya P. Mathur
    Security Relevancy Analysis on the Registry of Windows NT 4.0. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:331-340 [Conf]
  39. Richard B. Neely
    Security Architecture Development and Results for a Distributed Modeling and Simulation System . [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:341-348 [Conf]
  40. John G. Brainard
    SecurSight: An Architecture for Secure Information Access. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:349-0 [Conf]
  41. Heather M. Hinton, Crispin Cowan, Lois M. L. Delcambre, Shawn Bowers
    SAM: Security Adaptation Manager . [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:361-370 [Conf]
  42. Chris Sinclair, Lyn Pierce, Sara Matzner
    An Application of Machine Learning to Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:371-377 [Conf]
  43. Nittida Nuansri, Samar Singh, Tharam S. Dillon
    A Process State-Transition Analysis and Its Application to Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:378-388 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002