Conferences in DBLP
Tao Wan , Xue Dong Yang IntruDetector: A Software Platform for Testing Network Intrusion Detection Algorithms. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:3-11 [Conf ] Klaus Julisch Mining Alarm Clusters to Improve Alarm Handling Efficiency. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:12-21 [Conf ] Frédéric Cuppens Managing Alerts in a Multi-Intrusion Detection Environmen. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:22-31 [Conf ] Tim Buchheim , Michael Erlinger , Ben Feinstein , Greg Matthews , Roy Pollock , Joseph Betser , Andy Walther Implementing the Intrusion Detection Exchange Protocol. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:32-44 [Conf ] Peter Herrmann Information Flow Analysis of Component-Structured Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:45-54 [Conf ] Stephen D. Wolthusen Security Policy Enforcement at the File System Level in the Windows NT Operating System Family. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:55-63 [Conf ] David M. Wheeler , Adam Conyers , Jane Luo , Alex Xiong Java Security Extensions for a Java Server in a Hostile Environment. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:64-73 [Conf ] Eric Monteith Genoa TIE, Advanced Boundary Controller Experiment. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:74-84 [Conf ] Yih Huang , David Rine , Xunhua Wang A JCA-Based Implementation Framework for Threshold Cryptography. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:85-91 [Conf ] Duncan S. Wong , Hector Ho Fuentes , Agnes Hui Chan The Performance Measurement of Cryptographic Primitives on Palm Devices. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:92-101 [Conf ] Wenliang Du , Mikhail J. Atallah Privacy-Preserving Cooperative Statistical Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:102-112 [Conf ] Ben Feinstein , Greg Matthews , Stuart Staniford , Andy Walther Experiences Implementing a Common Format for IDS Alerts. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:113-116 [Conf ] Andreas Schaad Detecting Conflicts in a Role-Based Delegation Model. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:117-126 [Conf ] Pete Epstein , Ravi S. Sandhu Engineering of Role/Permission Assignments. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:127-136 [Conf ] Ramaswamy Chandramouli A Framework for Multiple Authorization Types in a Healthcare Application System. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:137-148 [Conf ] Wayne A. Jansen Determining Privileges of Mobile Agents. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:149-160 [Conf ] Dan Thomsen Introduction to Classic Papers. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:161- [Conf ] John E. Dobson , Brian Randell Building Reliable Secure Computing Systems out of Unreliable Insecure Components. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:162-173 [Conf ] Carl E. Landwehr , Constance L. Heitmeyer , John D. McLean A Security Model for Military Message Systems: Retrospective. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:174-190 [Conf ] John McHugh An Information Flow Tool for Gypsy. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:191-204 [Conf ] Roger R. Schell Information Security: Science, Pseudoscience, and Flying Pigs. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:205-218 [Conf ] Peng Liu DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:219-229 [Conf ] John C. Munson , Scott Wimer Watcher: The Missing Piece of the Security Puzzle. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:230-239 [Conf ] Ulf Lindqvist , Phillip A. Porras eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:240-251 [Conf ] Anita Jones , Song Li Temporal Signatures for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:252-264 [Conf ] Shan Jiang , Sean Smith , Kazuhiro Minami Securing Web Servers against Insider Attack . [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:265-276 [Conf ] Germano Caronni , Christoph L. Schuba Enabling Hierarchical and Bulk-Distribution for Watermarked Content. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:277-285 [Conf ] Albert Levi , Çetin Kaya Koç CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:286-295 [Conf ] Paul Ashley , Heather M. Hinton , Mark Vandenwauver Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:296-308 [Conf ] Piero A. Bonatti , Ernesto Damiani , Sabrina De Capitani di Vimercati , Pierangela Samarati A Component-Based Architecture for Secure Data Publication. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:309-318 [Conf ] Günter Karjoth The Authorization Service of Tivoli Policy Director. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:319-328 [Conf ] Charles Payne , Tom Markham Architecture and Applications for a Distributed Embedded Firewall. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:329-338 [Conf ] Matt Bishop , Anup K. Ghosh , James A. Whittaker How Useful is Software Fault Injection for Evaluating the Security of COTS Products? [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:339-342 [Conf ] Ron Gula , Gene Kim , Chris Klaus , Paul Proctor Security Vendor CTOs: Perspectives, Opinions, and Lessons Learned. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:343-346 [Conf ] Valentin Razmov , Daniel R. Simon Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:347-357 [Conf ] Ross J. Anderson Why Information Security is Hard-An Economic Perspective. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:358-365 [Conf ] John P. McDermott Abuse-Case-Based Assurance Arguments. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:366-376 [Conf ] Victoria Ungureanu A Regulated Approach to Certificate Management. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:377-385 [Conf ] James M. Hayes Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:386-390 [Conf ] Ronald Mraz Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:391-400 [Conf ] Nathalie Weiler Secure Anonymous Group Infrastructure for Common and Future Internet Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:401-410 [Conf ] David Mankins , Rajesh Krishnan , Ceilyn Boyd , John Zao , Michael Frentz Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:411-421 [Conf ] D. W. Gresty , Qi Shi , Madjid Merabti Requirements for a General Framework for Response to Distributed Denial-of-Service. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:422-432 [Conf ] Bernd Blobel Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:433-441 [Conf ] Anita K. Jones , Yu Lin Application Intrusion Detection using Language Library Calls. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:442-449 [Conf ] Ulrich Lang , Dieter Gollmann , Rudolf Schreiner Verifiable Identifiers in Middleware Security. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:450-462 [Conf ] Anna Entrichel , James Bergman , Jason Willis , Herb Little Computing Without Wires (Or Even a Net): The Pitfalls, Potentials, and Practicality of Wireless Networking. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:463-464 [Conf ]