Conferences in DBLP
Andreas Sterbenz An Evaluation of the Java Security Model. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:2-14 [Conf ] M. Nash , R. J. Kennett Implementing Security Policy in a Large Defense Procurement. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:15-23 [Conf ] John Kelsey , Bruce Schneier , Chris Hall An Authenticated Camera. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:24-31 [Conf ] Myong H. Kang , Ira S. Moskowitz , Bruce E. Montrose , James J. Parsonese A Case Study Of Two Nrl Pump Prototypes. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:32-43 [Conf ] John A. Davidson Asymmetric Isolation. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:44-54 [Conf ] Mark S. Anderson , Christopher James North , John Edmund Griffin , Robert Brunyee Milner , John Yesberg , Kenneth Kwok-Hei Yiu Starlight: Interactive Link. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:55-64 [Conf ] Herve Hosy , Mary Schanken Common Criteria Activities and Alternative Assurance. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:65-66 [Conf ] Mary Schanken SSE-CMM Pilot Results. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:67-68 [Conf ] Manfred Holzbach Security Measures For The Austrian "Paychip" Electronic Purse Application. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:69-77 [Conf ] Vijay Varadharajan , Yi Mu On The Design Of Secure Electronic Payment Schemes For Internet. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:78-87 [Conf ] Brigitte Althen , Gerd Enste , Brigitte Nebelung Innovative Secure Payments On The Internet Using The German Electronic Purse. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:88-94 [Conf ] Michael G. Reed , Paul F. Syverson , David M. Goldschlag Proxies For Anonymous Routing. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:95-104 [Conf ] Michael Hitchens , Vijay Varadharajan esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:105-116 [Conf ] Randall W. Lichota , Grace L. Hammonds , Stephen H. Brackin Verifying The Correctness Of Cryptographic Protocols Using "Convince". [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:117-128 [Conf ] Ning Zhang , Qi Shi Security Issues in an EDI Environment. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:129-137 [Conf ] Teresa F. Lunt , John Kimmins , Bob McKosky Security and the National Telecommunications Infrastructure. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:138-139 [Conf ] Jeremy Epstein , Tim Williams Using Fortezza For Transparent File Encryption. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:140-147 [Conf ] I-Lung Kao , Randy Chow An Extended Capability Architecture To Enforce Dynamic Access Control Policies. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:148-157 [Conf ] E. John Sebes , Terry C. Vickers Benzel SIGMA: Security For Distributed Object Interoperability Between Trusted And Untrusted Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:158-169 [Conf ] Julie L. Connolly Operation chain link: the deployment of a firewall at Hanscom Air Force Base. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:170-177 [Conf ] Richard E. Smith Mandatory Protection for Internet Server Software. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:178-184 [Conf ] Eric M. Kayden Using a Proxy X Server to Facilitate COTS Application Integration. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:185-191 [Conf ] Rae K. Burns , Yi-Fang Koh A Comparison of Multilevel Structured Query Language (SQL) Implementations. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:192-202 [Conf ] Luigi Giuri , Pietro Iglio A Role-Based Secure Database Design Tool. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:203-213 [Conf ] Mansour Esmaili , Bala Balachandran , Reihaneh Safavi-Naini , Josef Pieprzyk Case-Based Reasoning for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:214-223 [Conf ] Richard A. Kemmerer , Tad Taylor A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:224-235 [Conf ] Pierre Bieber Formal Techniques for an ITSEC-E4 Secure Gateway. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:236-246 [Conf ] Joel E. Sachs Major Questions in Applying the SSE-CMM. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:247-248 [Conf ]