The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
1996 (conf/acsac/1996)

  1. Andreas Sterbenz
    An Evaluation of the Java Security Model. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:2-14 [Conf]
  2. M. Nash, R. J. Kennett
    Implementing Security Policy in a Large Defense Procurement. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:15-23 [Conf]
  3. John Kelsey, Bruce Schneier, Chris Hall
    An Authenticated Camera. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:24-31 [Conf]
  4. Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese
    A Case Study Of Two Nrl Pump Prototypes. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:32-43 [Conf]
  5. John A. Davidson
    Asymmetric Isolation. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:44-54 [Conf]
  6. Mark S. Anderson, Christopher James North, John Edmund Griffin, Robert Brunyee Milner, John Yesberg, Kenneth Kwok-Hei Yiu
    Starlight: Interactive Link. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:55-64 [Conf]
  7. Herve Hosy, Mary Schanken
    Common Criteria Activities and Alternative Assurance. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:65-66 [Conf]
  8. Mary Schanken
    SSE-CMM Pilot Results. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:67-68 [Conf]
  9. Manfred Holzbach
    Security Measures For The Austrian "Paychip" Electronic Purse Application. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:69-77 [Conf]
  10. Vijay Varadharajan, Yi Mu
    On The Design Of Secure Electronic Payment Schemes For Internet. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:78-87 [Conf]
  11. Brigitte Althen, Gerd Enste, Brigitte Nebelung
    Innovative Secure Payments On The Internet Using The German Electronic Purse. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:88-94 [Conf]
  12. Michael G. Reed, Paul F. Syverson, David M. Goldschlag
    Proxies For Anonymous Routing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:95-104 [Conf]
  13. Michael Hitchens, Vijay Varadharajan
    esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:105-116 [Conf]
  14. Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin
    Verifying The Correctness Of Cryptographic Protocols Using "Convince". [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:117-128 [Conf]
  15. Ning Zhang, Qi Shi
    Security Issues in an EDI Environment. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:129-137 [Conf]
  16. Teresa F. Lunt, John Kimmins, Bob McKosky
    Security and the National Telecommunications Infrastructure. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:138-139 [Conf]
  17. Jeremy Epstein, Tim Williams
    Using Fortezza For Transparent File Encryption. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:140-147 [Conf]
  18. I-Lung Kao, Randy Chow
    An Extended Capability Architecture To Enforce Dynamic Access Control Policies. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:148-157 [Conf]
  19. E. John Sebes, Terry C. Vickers Benzel
    SIGMA: Security For Distributed Object Interoperability Between Trusted And Untrusted Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:158-169 [Conf]
  20. Julie L. Connolly
    Operation chain link: the deployment of a firewall at Hanscom Air Force Base. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:170-177 [Conf]
  21. Richard E. Smith
    Mandatory Protection for Internet Server Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:178-184 [Conf]
  22. Eric M. Kayden
    Using a Proxy X Server to Facilitate COTS Application Integration. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:185-191 [Conf]
  23. Rae K. Burns, Yi-Fang Koh
    A Comparison of Multilevel Structured Query Language (SQL) Implementations. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:192-202 [Conf]
  24. Luigi Giuri, Pietro Iglio
    A Role-Based Secure Database Design Tool. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:203-213 [Conf]
  25. Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk
    Case-Based Reasoning for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:214-223 [Conf]
  26. Richard A. Kemmerer, Tad Taylor
    A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:224-235 [Conf]
  27. Pierre Bieber
    Formal Techniques for an ITSEC-E4 Secure Gateway. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:236-246 [Conf]
  28. Joel E. Sachs
    Major Questions in Applying the SSE-CMM. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:247-248 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002