Conferences in DBLP
Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan Micro-Digital Money for Electronic Commerce. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:2-8 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan Secure and Efficient Digital Coins. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:9-15 [Conf ] Eberhard von Faber , R. Hammelrath , F.-P. Heider The Secure Distribution of Digital Contents. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:16-0 [Conf ] C. Cant , Simon R. Wiseman Simple Assured Bastion Hosts. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:24-33 [Conf ] George M. Mohay , J. Zellers Kernel and Shell-Based Applications Integrity Assurance. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:34-43 [Conf ] J. W. Freeman , T. C. Darr , Richard B. Neely Risk Assessment for Large Heterogeneous Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:44-53 [Conf ] S. Lewis , Simon R. Wiseman Securing an Object Relational Database. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:59-68 [Conf ] Simon N. Foley Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:69-80 [Conf ] Dan Thompson , M. Denz Incremental Assurance for Multilevel Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:81-0 [Conf ] S. Cheung An Efficient Message Authentication Scheme for Link State Routing. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:90-98 [Conf ] Kymie M. C. Tan , Blair R. Collie Detection and Classification of TCP/IP Network Services. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:99-107 [Conf ] Bob Askwith , Madjid Merabti , Qi Shi , K. Whiteley Achieving User Privacy in Mobile Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:108-0 [Conf ] K. A. Oostendorp , Lee Badger , C. D. Vance , W. G. Morrison , M. Petkac , David L. Sherman , Daniel F. Sterne Domain and Type Enforcement Firewalls. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:122-132 [Conf ] Christoph L. Schuba , Eugene H. Spafford A Reference Model for Firewall Technology. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:133-0 [Conf ] P. Greve , J. Hoffman , R. E. Smith Using Type Enforcement to Assure a Configurable Guard. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:146-0 [Conf ] J. Hoffman Implementing RBAC on a Type Enforced System. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:158-163 [Conf ] T. F. Himdi , Ravi S. Sandhu Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:164-174 [Conf ] T. Mitchem , R. Lu , R. O'Brian Using Kernel Hypervisors to Secure Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:175-0 [Conf ] T. Lowman , D. Mosier Applying the DOD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architecture. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:183-193 [Conf ] Myong H. Kang , Judith N. Froscher , Ira S. Moskowitz An Architecture for Multilevel Secure Interoperability. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:194-204 [Conf ] R. E. Niemeyer Using Web Technologies in Two MLS Environments: A Security Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:205-0 [Conf ] Yung-Cheng Lee , Chi-Sung Laih On the Key Recovery of the Key Escrow System. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:216-220 [Conf ] Chih-Hung Wang , Tzonelih Hwang Threshold and Generalized DSS Signatures without a Trusted Party. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:221-226 [Conf ] Bruce Schneier , Chris Hall An Improved E-Mail Security Protocol. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:227-0 [Conf ] Chris Hall , Bruce Schneier Remote Electronic Gambling. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:232-238 [Conf ] F. C. Smith Ethical Responsibilities and Legal Liabilities of Network Security Professionals. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:239-250 [Conf ] D. B. Baker , R. M. Barnhart , T. T. Buss PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:251-0 [Conf ] John P. McDermott , R. Gelinas , S. Ornstein Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:265-0 [Conf ] Carl E. Landwehr Protecting Unattended Computers Without Software. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:274-0 [Conf ]