Conferences in DBLP
Marcel Waldvogel GOSSIB vs. IP Traceback Rumors. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:5-13 [Conf ] Giovanni Vigna , Fredrik Valeur , Jingyu Zhou , Richard A. Kemmerer Composable Tools For Network Discovery and Security Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:14-24 [Conf ] Ronald W. Ritchey , Brian O'Berry , Steven Noel Representing TCP/IP Connectivity For Topological Analysis of Network Security. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:25-34 [Conf ] Victoria Ungureanu Regulating E-Commerce through Certified Contracts. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:35-43 [Conf ] Hanno Langweg With Gaming Technology towards Secure User Interfaces. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:44-50 [Conf ] Donghua Xu , Chenghuai Lu , André L. M. dos Santos Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:51-60 [Conf ] Matthew M. Williamson Throttling Viruses: Restricting propagation to defeat malicious mobile code. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:61-68 [Conf ] Weijiang Yu , Aloysius K. Mok Enforcing Resource Bound Safety for Mobile SNMP Agents. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:69-77 [Conf ] Tuomas Aura , Michael Roe , Jari Arkko Security of Internet Location Management. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:78-90 [Conf ] Dale M. Johnson Wireless Security: Vulnerabilities and Countermeasures. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:91-95 [Conf ] O. Sami Saydjari LOCK : An Historical Perspective. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:96-108 [Conf ] Richard A. Kemmerer A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:109-118 [Conf ] Paul A. Karger , Roger R. Schell Thirty Years Later: Lessons from the Multics Security Evaluation. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:119-148 [Conf ] Blaise Gassend , Dwaine E. Clarke , Marten van Dijk , Srinivas Devadas Controlled Physical Random Functions. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:149-160 [Conf ] Bogdan C. Popescu , Maarten van Steen , Andrew S. Tanenbaum A Security Architecture for Object-Based Distributed Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:161-171 [Conf ] John R. Douceur , Atul Adya , Josh Benaloh , William J. Bolosky , Gideon Yuval A Secure Directory Service based on Exclusive Encryption. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:172-184 [Conf ] Daniel Geer , John Harthorne Penetration Testing: A Duet. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:185-198 [Conf ] Matthew Schmid , Frank Hill , Anup K. Ghosh Protecting Data from Malicious Software. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:199-208 [Conf ] Kevin Scott , Jack W. Davidson Safe Virtual Execution Using Software Dynamic Translation. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:209-218 [Conf ] Florian P. Buchholz , Thomas E. Daniels , James P. Early , Rajeev Gopalakrishna , R. Patrick Gorman , Benjamin A. Kuperman , Sofie Nystrom , Addam Schroll , Andrew Smith Digging For Worms, Fishing For Answers. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:219-228 [Conf ] Andreas Schaad , Jonathan D. Moffett A Framework for Organisational Control Principles. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:229-238 [Conf ] Stefan Probst , Wolfgang Eßmayr , Edgar Weippl Reusable Components for Developing Security-Aware Application. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:239-248 [Conf ] Michael J. Covington , Prahlad Fogla , Zhiyuan Zhan , Mustaque Ahamad A Context-Aware Security Architecture for Emerging Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:249-260 [Conf ] Roberto Barbieri , Danilo Bruschi , Emilia Rosti Voice over IPsec: Analysis and Solutions. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:261-270 [Conf ] Michael Clifford Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:271-281 [Conf ] Malcolm Corney , Olivier Y. de Vel , Alison Anderson , George M. Mohay Gender-Preferential Text Mining of E-mail Discourse. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:282-292 [Conf ] Duane Hybertson , A. Reedy , S. Chapin , M. Kirwan Jr. Enterprise Engineering And Security: Enterprise Frameworks and Architectures, and IA Patterns. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:293-296 [Conf ] Cristina Serban , O. Sami Saydjari Themes and Highlights of the New Security Paradigms Workshop 2002. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:297-300 [Conf ] Thomas Toth , Christopher Krügel Evaluating the Impact of Automated Intrusion Response Mechanisms. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:301-310 [Conf ] Peng Liu Architectures for Intrusion Tolerant Database Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:311-320 [Conf ] Dustin Lee , Jeff Rowe , Calvin Ko , Karl N. Levitt Detecting and Defending against Web-Server Fingerprinting. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:321-332 [Conf ] Axel Kern Advanced Features for Enterprise-Wide Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:333-342 [Conf ] Geetanjali Sampemane , Prasad Naldurg , Roy H. Campbell Access Control for Active Spaces. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:343-352 [Conf ] Mohammad A. Al-Kahtani , Ravi S. Sandhu A Model for Attribute-Based User-Role Assignment. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:353-364 [Conf ] Karl N. Levitt Intrusion Detection: Current Capabilities and Future Directions. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:365-370 [Conf ] Mary Ellen Zurko , Charlie Kaufman , Katherine Spanbauer , Chuck Bassett Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:371-381 [Conf ] Andrew D. Marshall A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:382-390 [Conf ] Herbert Leitold , Arno Hollosi , Reinhard Posch Security Architecture of the Austrian Citizen Card Concept. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:391-402 [Conf ] Frank Adelstein , Matthew Stillerman , Dexter Kozen Malicious Code Detection for Open Firmware. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:403-412 [Conf ] John Haggerty , Qi Shi , Madjid Merabti Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:413-422 [Conf ] Michael Weber , Matthew Schmid , Michael Schatz , David Geyer A Toolkit for Detecting and Analyzing Malicious Software. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:423- [Conf ]