Conferences in DBLP
Dipankar Dasgupta , Fabio A. González An Intelligent Decision Support System for Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:1-14 [Conf ] Alexander Grusho Mathematical Models of the Covert Channels. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:15-20 [Conf ] Catherine Meadows Open Issues in Formal Methods for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:21- [Conf ] Ravi S. Sandhu Future Directions in Role-Based Access Control Models. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:22-26 [Conf ] Vijay Varadharajan Secure Networked Computing. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:27- [Conf ] Jan Jürjens Composability of Secrecy. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:28-38 [Conf ] Vladimir I. Gorodetski , Oleg Karsaev , Alexey Khabalov , Igor V. Kotenko , Leonard J. Popyack , Victor A. Skormin Agent-Based Model of Computer Network Security System: A Case Study. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:39-50 [Conf ] Michael Smirnov Security Considerations and Models for Service Creation in Premium IP Networks. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:51-62 [Conf ] Peter D. Zegzhda , Dmitry P. Zegzhda Secure Systems Design Technology. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:63-71 [Conf ] Dimitris Gritzalis , Konstantinos Moulinos , Konstantinos Kostis A Privacy-Enhancing e-Business Model Based on Infomediaries. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:72-83 [Conf ] Constance L. Heitmeyer Applying Practical Formal Methods to the Specification and Analysis of Security Properties. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:84-89 [Conf ] Andrey Kostogryzov Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ). [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:90-101 [Conf ] Konstantin Knorr , Harald Weidner Analyzing Separation of Duties in Petri Net Workflows. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:102-114 [Conf ] Alexander O. Tarakanov Information Security with Formal Immune Networks. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:115-126 [Conf ] Victor A. Skormin , José G. Delgado-Frias , Dennis L. McGee , Joseph Giordano , Leonard J. Popyack , Vladimir I. Gorodetski , Alexander O. Tarakanov BASIS: A Biological Approach to System Information Security. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:127-142 [Conf ] Alexandr Seleznyov , Oleksiy Mazhelis , Seppo Puuronen Learning Temporal Regularities of User Behavior for Anomaly Detection. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:143-152 [Conf ] Harjit Singh , Steven Furnell , Benn Lines , Paul Dowland Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:153-158 [Conf ] Iliano Cervesato Typed MSR: Syntax and Examples. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:159-177 [Conf ] Steve Barker TRBAC: A Temporal Authorization Model. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:178-188 [Conf ] Tatyana Ryutov , B. Clifford Neuman The Set and Function Approach to Modeling Authorization in Distributed Systems. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:189-206 [Conf ] Dmitry P. Zegzhda , Pavel G. Stepanov , Alexey D. Otavin Fenix Secure Operating System: Principles, Models and Architecture. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:207-218 [Conf ] Valeri Korjik , Kirill Morozov Generalized Oblivious Transfer Protocols Based on Noisy Channels. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:219-229 [Conf ] Boris V. Izotov , Alexander A. Moldovyan , Nick A. Moldovyan Controlled Operations as a Cryptographic Primitive. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:230-241 [Conf ] Viktor Yakovlev , Valery Korjik , Alexander Sinuk Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:242-250 [Conf ] Ghassan Chaddoud , Isabelle Chrisment , André Schaff Dynamic Group Key Management Protocol. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:251-262 [Conf ] Vladimir I. Gorodetski , Leonard J. Popyack , Vladimir Samoilov , Victor A. Skormin SVD-Based Approach to Transparent Embedding Data into Digital Images. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:263-274 [Conf ] Nick D. Goots , Alexander A. Moldovyan , Nick A. Moldovyan Fast Encryption Algorithm Spectr-H64. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:275-286 [Conf ] Antonio Durante , Riccardo Focardi , Roberto Gorrieri CVS at Work: A Report on New Failures upon Some Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:287-299 [Conf ] Selçuk Kavut , Melek D. Yücel On Some Cryptographic Properties of Rijndael. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:300-312 [Conf ]