default search action
16. ACSAC 2000: New Orleans, Louisiana, USA
- 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA. IEEE Computer Society 2000, ISBN 0-7695-0859-6
Intrusion Detection
- Ian Brown, B. Laurie:
Security Against Compelled Disclosure. 2-10 - Michael J. Petkac, Lee Badger:
Security Agility in Response to Intrusion Detection. 11-20 - Christoph C. Michael, Anup K. Ghosh:
Two State-based Approaches to Program-based Anomaly Detection. 21-
Distributed/Network Security
- E. Strother:
Denial of Service Protection - The Nozzle. 32-41 - Germano Caronni, Sandeep Kumar, Christoph L. Schuba, Glenn Scott:
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking. 42-51 - Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine:
Enabling Secure On-Line DNS Dynamic Update. 52-
Engineering and Analysis
- Dale M. Johnson, Lee A. Benzinger:
Layering Boundary Protections: An Experiment in Information Assurance. 60-66 - John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi:
Extending Java for Package based Access Control. 67-76 - Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell:
Secure Smart Homes using Jini and UIUC SESAME. 77-
Defining, Computing, and Interpreting Trust - Panel
Security Policy
- André L. M. dos Santos, Richard A. Kemmerer:
Implementing Security Policies using the Safe Areas of Computation Approach. 90-99 - Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu:
Policy Mediation for Multi-Enterprise Environments. 100-106 - Kai Rannenberg, Giovanni Iachello:
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? 107-
Public Key Infrastructure I
- Joon S. Park, Ravi S. Sandhu:
Binding Identities and Attributes using Digitally Signed Certificates. 120-127 - Petra Wohlmacher, Peter Pharow:
Applications in Health Care using Public-Key Certificates and Attribute Certificates. 128-137 - Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta:
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). 138-
Access Control I
- Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky:
A Policy-based Access Control Mechanism for the Corporate Web. 150-158 - Konstantin Knorr:
Dynamic Access Control through Petri Net Workflows. 159-167 - Ezedin Barka, Ravi S. Sandhu:
Framework for Role-based Delegation Models. 168-
Intrusion Detection II
- Thomas E. Daniels, Eugene H. Spafford:
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. 178-187 - Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti:
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. 188-195 - Heejin Jang, Sangwook Kim:
A Self-Extension Monitoring for Security Management. 196-
Collaboration -Can It Be Done Securely? Panel
Security Architecture
- Pierre Bieber, D. Raujol, Pierre Siron:
Security Architecture for Federated Cooperative Information Systems. 208-216 - P. C. Clark, M. C. Meissner, K. O. Vance:
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. 217-223 - Jaehong Park, Ravi S. Sandhu, J. Schifalacqua:
Security Architectures for Controlled Digital Information Dissemination. 224-
Engineering and Analysis II
- Jeremy Epstein, Linda Thomas, Eric Monteith:
Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. 236-245 - Chenxi Wang, John C. Knight, Matthew C. Elder:
On Computer Viral Infection and the Effect of Immunization. 246-256 - John Viega, J. T. Bloch, Y. Kohno, Gary McGraw:
ITS4: A Static Vulnerability Scanner for C and C++ Code. 257-
Public Key Infrastructure II
- Eugenio Faldella, Marco Prandini:
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. 270-277 - Peter Gutmann:
A Reliable, Scalable General-Purpose Certificate Store. 278-287 - Feng Bao:
Introducing Decryption Authority into PKI. 288-
E-Commerce
- Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean:
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. 298-307 - Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang:
Experience with Software Watermarking. 308-316 - Michael A. Schneider, Edward W. Felten:
Efficient Commerce Protocols based on One-Time Pads. 317-
Security Management
- Jeff Hayes:
Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. 328-333 - E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine:
Calculating Costs for Quality of Security Service. 334-343 - Uwe Jendricke, Daniela Gerd tom Markotten:
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. 344-
Access Control II
- Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman:
A Flexible Access Control Service for Java Mobile Code. 356-365 - Margus Freudenthal, Sven Heiberg, Jan Willemson:
Personal Security Environment on Palm PDA. 366-372 - Reiner Sailer, Matthias Kabatnik:
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. 373-
Cryptography
- Johann Großschädl:
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. 384-393 - Weiliang Zhao, Vijay Varadharajan, Yi Mu:
Fair On-line Gambling. 394-400 - Murat Aydos, Tugrul Yanik, Çetin Kaya Koç:
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. 401-410
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.