The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
2001 (conf/acsac/2001)

  1. Tao Wan, Xue Dong Yang
    IntruDetector: A Software Platform for Testing Network Intrusion Detection Algorithms. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:3-11 [Conf]
  2. Klaus Julisch
    Mining Alarm Clusters to Improve Alarm Handling Efficiency. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:12-21 [Conf]
  3. Frédéric Cuppens
    Managing Alerts in a Multi-Intrusion Detection Environmen. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:22-31 [Conf]
  4. Tim Buchheim, Michael Erlinger, Ben Feinstein, Greg Matthews, Roy Pollock, Joseph Betser, Andy Walther
    Implementing the Intrusion Detection Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:32-44 [Conf]
  5. Peter Herrmann
    Information Flow Analysis of Component-Structured Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:45-54 [Conf]
  6. Stephen D. Wolthusen
    Security Policy Enforcement at the File System Level in the Windows NT Operating System Family. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:55-63 [Conf]
  7. David M. Wheeler, Adam Conyers, Jane Luo, Alex Xiong
    Java Security Extensions for a Java Server in a Hostile Environment. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:64-73 [Conf]
  8. Eric Monteith
    Genoa TIE, Advanced Boundary Controller Experiment. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:74-84 [Conf]
  9. Yih Huang, David Rine, Xunhua Wang
    A JCA-Based Implementation Framework for Threshold Cryptography. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:85-91 [Conf]
  10. Duncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan
    The Performance Measurement of Cryptographic Primitives on Palm Devices. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:92-101 [Conf]
  11. Wenliang Du, Mikhail J. Atallah
    Privacy-Preserving Cooperative Statistical Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:102-112 [Conf]
  12. Ben Feinstein, Greg Matthews, Stuart Staniford, Andy Walther
    Experiences Implementing a Common Format for IDS Alerts. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:113-116 [Conf]
  13. Andreas Schaad
    Detecting Conflicts in a Role-Based Delegation Model. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:117-126 [Conf]
  14. Pete Epstein, Ravi S. Sandhu
    Engineering of Role/Permission Assignments. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:127-136 [Conf]
  15. Ramaswamy Chandramouli
    A Framework for Multiple Authorization Types in a Healthcare Application System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:137-148 [Conf]
  16. Wayne A. Jansen
    Determining Privileges of Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:149-160 [Conf]
  17. Dan Thomsen
    Introduction to Classic Papers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:161- [Conf]
  18. John E. Dobson, Brian Randell
    Building Reliable Secure Computing Systems out of Unreliable Insecure Components. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:162-173 [Conf]
  19. Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean
    A Security Model for Military Message Systems: Retrospective. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:174-190 [Conf]
  20. John McHugh
    An Information Flow Tool for Gypsy. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:191-204 [Conf]
  21. Roger R. Schell
    Information Security: Science, Pseudoscience, and Flying Pigs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:205-218 [Conf]
  22. Peng Liu
    DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:219-229 [Conf]
  23. John C. Munson, Scott Wimer
    Watcher: The Missing Piece of the Security Puzzle. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:230-239 [Conf]
  24. Ulf Lindqvist, Phillip A. Porras
    eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:240-251 [Conf]
  25. Anita Jones, Song Li
    Temporal Signatures for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:252-264 [Conf]
  26. Shan Jiang, Sean Smith, Kazuhiro Minami
    Securing Web Servers against Insider Attack . [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:265-276 [Conf]
  27. Germano Caronni, Christoph L. Schuba
    Enabling Hierarchical and Bulk-Distribution for Watermarked Content. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:277-285 [Conf]
  28. Albert Levi, Çetin Kaya Koç
    CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:286-295 [Conf]
  29. Paul Ashley, Heather M. Hinton, Mark Vandenwauver
    Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:296-308 [Conf]
  30. Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    A Component-Based Architecture for Secure Data Publication. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:309-318 [Conf]
  31. Günter Karjoth
    The Authorization Service of Tivoli Policy Director. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:319-328 [Conf]
  32. Charles Payne, Tom Markham
    Architecture and Applications for a Distributed Embedded Firewall. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:329-338 [Conf]
  33. Matt Bishop, Anup K. Ghosh, James A. Whittaker
    How Useful is Software Fault Injection for Evaluating the Security of COTS Products? [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:339-342 [Conf]
  34. Ron Gula, Gene Kim, Chris Klaus, Paul Proctor
    Security Vendor CTOs: Perspectives, Opinions, and Lessons Learned. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:343-346 [Conf]
  35. Valentin Razmov, Daniel R. Simon
    Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:347-357 [Conf]
  36. Ross J. Anderson
    Why Information Security is Hard-An Economic Perspective. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:358-365 [Conf]
  37. John P. McDermott
    Abuse-Case-Based Assurance Arguments. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:366-376 [Conf]
  38. Victoria Ungureanu
    A Regulated Approach to Certificate Management. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:377-385 [Conf]
  39. James M. Hayes
    Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:386-390 [Conf]
  40. Ronald Mraz
    Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:391-400 [Conf]
  41. Nathalie Weiler
    Secure Anonymous Group Infrastructure for Common and Future Internet Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:401-410 [Conf]
  42. David Mankins, Rajesh Krishnan, Ceilyn Boyd, John Zao, Michael Frentz
    Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:411-421 [Conf]
  43. D. W. Gresty, Qi Shi, Madjid Merabti
    Requirements for a General Framework for Response to Distributed Denial-of-Service. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:422-432 [Conf]
  44. Bernd Blobel
    Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:433-441 [Conf]
  45. Anita K. Jones, Yu Lin
    Application Intrusion Detection using Language Library Calls. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:442-449 [Conf]
  46. Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
    Verifiable Identifiers in Middleware Security. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:450-462 [Conf]
  47. Anna Entrichel, James Bergman, Jason Willis, Herb Little
    Computing Without Wires (Or Even a Net): The Pitfalls, Potentials, and Practicality of Wireless Networking. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:463-464 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002