The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
2002 (conf/acsac/2002)

  1. Marcel Waldvogel
    GOSSIB vs. IP Traceback Rumors. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:5-13 [Conf]
  2. Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer
    Composable Tools For Network Discovery and Security Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:14-24 [Conf]
  3. Ronald W. Ritchey, Brian O'Berry, Steven Noel
    Representing TCP/IP Connectivity For Topological Analysis of Network Security. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:25-34 [Conf]
  4. Victoria Ungureanu
    Regulating E-Commerce through Certified Contracts. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:35-43 [Conf]
  5. Hanno Langweg
    With Gaming Technology towards Secure User Interfaces. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:44-50 [Conf]
  6. Donghua Xu, Chenghuai Lu, André L. M. dos Santos
    Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:51-60 [Conf]
  7. Matthew M. Williamson
    Throttling Viruses: Restricting propagation to defeat malicious mobile code. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:61-68 [Conf]
  8. Weijiang Yu, Aloysius K. Mok
    Enforcing Resource Bound Safety for Mobile SNMP Agents. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:69-77 [Conf]
  9. Tuomas Aura, Michael Roe, Jari Arkko
    Security of Internet Location Management. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:78-90 [Conf]
  10. Dale M. Johnson
    Wireless Security: Vulnerabilities and Countermeasures. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:91-95 [Conf]
  11. O. Sami Saydjari
    LOCK : An Historical Perspective. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:96-108 [Conf]
  12. Richard A. Kemmerer
    A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:109-118 [Conf]
  13. Paul A. Karger, Roger R. Schell
    Thirty Years Later: Lessons from the Multics Security Evaluation. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:119-148 [Conf]
  14. Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas
    Controlled Physical Random Functions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:149-160 [Conf]
  15. Bogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum
    A Security Architecture for Object-Based Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:161-171 [Conf]
  16. John R. Douceur, Atul Adya, Josh Benaloh, William J. Bolosky, Gideon Yuval
    A Secure Directory Service based on Exclusive Encryption. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:172-184 [Conf]
  17. Daniel Geer, John Harthorne
    Penetration Testing: A Duet. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:185-198 [Conf]
  18. Matthew Schmid, Frank Hill, Anup K. Ghosh
    Protecting Data from Malicious Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:199-208 [Conf]
  19. Kevin Scott, Jack W. Davidson
    Safe Virtual Execution Using Software Dynamic Translation. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:209-218 [Conf]
  20. Florian P. Buchholz, Thomas E. Daniels, James P. Early, Rajeev Gopalakrishna, R. Patrick Gorman, Benjamin A. Kuperman, Sofie Nystrom, Addam Schroll, Andrew Smith
    Digging For Worms, Fishing For Answers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:219-228 [Conf]
  21. Andreas Schaad, Jonathan D. Moffett
    A Framework for Organisational Control Principles. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:229-238 [Conf]
  22. Stefan Probst, Wolfgang Eßmayr, Edgar Weippl
    Reusable Components for Developing Security-Aware Application. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:239-248 [Conf]
  23. Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, Mustaque Ahamad
    A Context-Aware Security Architecture for Emerging Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:249-260 [Conf]
  24. Roberto Barbieri, Danilo Bruschi, Emilia Rosti
    Voice over IPsec: Analysis and Solutions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:261-270 [Conf]
  25. Michael Clifford
    Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:271-281 [Conf]
  26. Malcolm Corney, Olivier Y. de Vel, Alison Anderson, George M. Mohay
    Gender-Preferential Text Mining of E-mail Discourse. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:282-292 [Conf]
  27. Duane Hybertson, A. Reedy, S. Chapin, M. Kirwan Jr.
    Enterprise Engineering And Security: Enterprise Frameworks and Architectures, and IA Patterns. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:293-296 [Conf]
  28. Cristina Serban, O. Sami Saydjari
    Themes and Highlights of the New Security Paradigms Workshop 2002. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:297-300 [Conf]
  29. Thomas Toth, Christopher Krügel
    Evaluating the Impact of Automated Intrusion Response Mechanisms. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:301-310 [Conf]
  30. Peng Liu
    Architectures for Intrusion Tolerant Database Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:311-320 [Conf]
  31. Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt
    Detecting and Defending against Web-Server Fingerprinting. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:321-332 [Conf]
  32. Axel Kern
    Advanced Features for Enterprise-Wide Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:333-342 [Conf]
  33. Geetanjali Sampemane, Prasad Naldurg, Roy H. Campbell
    Access Control for Active Spaces. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:343-352 [Conf]
  34. Mohammad A. Al-Kahtani, Ravi S. Sandhu
    A Model for Attribute-Based User-Role Assignment. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:353-364 [Conf]
  35. Karl N. Levitt
    Intrusion Detection: Current Capabilities and Future Directions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:365-370 [Conf]
  36. Mary Ellen Zurko, Charlie Kaufman, Katherine Spanbauer, Chuck Bassett
    Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:371-381 [Conf]
  37. Andrew D. Marshall
    A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:382-390 [Conf]
  38. Herbert Leitold, Arno Hollosi, Reinhard Posch
    Security Architecture of the Austrian Citizen Card Concept. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:391-402 [Conf]
  39. Frank Adelstein, Matthew Stillerman, Dexter Kozen
    Malicious Code Detection for Open Firmware. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:403-412 [Conf]
  40. John Haggerty, Qi Shi, Madjid Merabti
    Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:413-422 [Conf]
  41. Michael Weber, Matthew Schmid, Michael Schatz, David Geyer
    A Toolkit for Detecting and Analyzing Malicious Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:423- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002