


default search action
16. ACSAC 2000: New Orleans, Louisiana, USA
- 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA. IEEE Computer Society 2000, ISBN 0-7695-0859-6

Intrusion Detection
- Ian Brown, B. Laurie:

Security Against Compelled Disclosure. 2-10 - Michael J. Petkac, Lee Badger:

Security Agility in Response to Intrusion Detection. 11-20 - Christoph C. Michael, Anup K. Ghosh:

Two State-based Approaches to Program-based Anomaly Detection. 21-
Distributed/Network Security
- E. Strother:

Denial of Service Protection - The Nozzle. 32-41 - Germano Caronni, Sandeep Kumar, Christoph L. Schuba, Glenn Scott:

Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking. 42-51 - Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine:

Enabling Secure On-Line DNS Dynamic Update. 52-
Engineering and Analysis
- Dale M. Johnson, Lee A. Benzinger:

Layering Boundary Protections: An Experiment in Information Assurance. 60-66 - John Hale

, Mauricio Papa
, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi:
Extending Java for Package based Access Control. 67-76 - Jalal Al-Muhtadi

, Manish Anand, M. Dennis Mickunas, Roy H. Campbell:
Secure Smart Homes using Jini and UIUC SESAME. 77-
Defining, Computing, and Interpreting Trust - Panel
Security Policy
- André L. M. dos Santos, Richard A. Kemmerer:

Implementing Security Policies using the Safe Areas of Computation Approach. 90-99 - Pablo Galiasso, Oliver Bremer, John Hale

, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu:
Policy Mediation for Multi-Enterprise Environments. 100-106 - Kai Rannenberg, Giovanni Iachello:

Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? 107-
Public Key Infrastructure I
- Joon S. Park, Ravi S. Sandhu:

Binding Identities and Attributes using Digitally Signed Certificates. 120-127 - Petra Wohlmacher, Peter Pharow:

Applications in Health Care using Public-Key Certificates and Attribute Certificates. 128-137 - Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta:

Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). 138-
Access Control I
- Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky:

A Policy-based Access Control Mechanism for the Corporate Web. 150-158 - Konstantin Knorr:

Dynamic Access Control through Petri Net Workflows. 159-167 - Ezedin Barka, Ravi S. Sandhu:

Framework for Role-based Delegation Models. 168-
Intrusion Detection II
- Thomas E. Daniels, Eugene H. Spafford:

A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. 178-187 - Danilo Bruschi, Lorenzo Cavallaro

, Emilia Rosti:
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. 188-195 - Heejin Jang, Sangwook Kim:

A Self-Extension Monitoring for Security Management. 196-
Collaboration -Can It Be Done Securely? Panel
Security Architecture
- Pierre Bieber, D. Raujol, Pierre Siron

:
Security Architecture for Federated Cooperative Information Systems. 208-216 - P. C. Clark, M. C. Meissner, K. O. Vance:

Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. 217-223 - Jaehong Park, Ravi S. Sandhu, J. Schifalacqua:

Security Architectures for Controlled Digital Information Dissemination. 224-
Engineering and Analysis II
- Jeremy Epstein, Linda Thomas, Eric Monteith:

Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. 236-245 - Chenxi Wang, John C. Knight, Matthew C. Elder:

On Computer Viral Infection and the Effect of Immunization. 246-256 - John Viega, J. T. Bloch, Y. Kohno, Gary McGraw:

ITS4: A Static Vulnerability Scanner for C and C++ Code. 257-
Public Key Infrastructure II
- Eugenio Faldella, Marco Prandini

:
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. 270-277 - Peter Gutmann:

A Reliable, Scalable General-Purpose Certificate Store. 278-287 - Feng Bao:

Introducing Decryption Authority into PKI. 288-
E-Commerce
- Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean:

Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. 298-307 - Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang:

Experience with Software Watermarking. 308-316 - Michael A. Schneider, Edward W. Felten:

Efficient Commerce Protocols based on One-Time Pads. 317-
Security Management
- Jeff Hayes:

Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. 328-333 - E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine:

Calculating Costs for Quality of Security Service. 334-343 - Uwe Jendricke, Daniela Gerd tom Markotten:

Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. 344-
Access Control II
- Antonio Corradi

, Rebecca Montanari
, Cesare Stefanelli, Emil Lupu, Morris Sloman:
A Flexible Access Control Service for Java Mobile Code. 356-365 - Margus Freudenthal, Sven Heiberg, Jan Willemson

:
Personal Security Environment on Palm PDA. 366-372 - Reiner Sailer, Matthias Kabatnik:

History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. 373-
Cryptography
- Johann Großschädl:

The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. 384-393 - Weiliang Zhao

, Vijay Varadharajan, Yi Mu:
Fair On-line Gambling. 394-400 - Murat Aydos

, Tugrul Yanik, Çetin Kaya Koç:
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. 401-410

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














