The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
1997 (conf/acsac/1997)

  1. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Micro-Digital Money for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:2-8 [Conf]
  2. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Secure and Efficient Digital Coins. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:9-15 [Conf]
  3. Eberhard von Faber, R. Hammelrath, F.-P. Heider
    The Secure Distribution of Digital Contents. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:16-0 [Conf]
  4. C. Cant, Simon R. Wiseman
    Simple Assured Bastion Hosts. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:24-33 [Conf]
  5. George M. Mohay, J. Zellers
    Kernel and Shell-Based Applications Integrity Assurance. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:34-43 [Conf]
  6. J. W. Freeman, T. C. Darr, Richard B. Neely
    Risk Assessment for Large Heterogeneous Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:44-53 [Conf]
  7. S. Lewis, Simon R. Wiseman
    Securing an Object Relational Database. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:59-68 [Conf]
  8. Simon N. Foley
    Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:69-80 [Conf]
  9. Dan Thompson, M. Denz
    Incremental Assurance for Multilevel Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:81-0 [Conf]
  10. S. Cheung
    An Efficient Message Authentication Scheme for Link State Routing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:90-98 [Conf]
  11. Kymie M. C. Tan, Blair R. Collie
    Detection and Classification of TCP/IP Network Services. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:99-107 [Conf]
  12. Bob Askwith, Madjid Merabti, Qi Shi, K. Whiteley
    Achieving User Privacy in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:108-0 [Conf]
  13. K. A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, M. Petkac, David L. Sherman, Daniel F. Sterne
    Domain and Type Enforcement Firewalls. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:122-132 [Conf]
  14. Christoph L. Schuba, Eugene H. Spafford
    A Reference Model for Firewall Technology. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:133-0 [Conf]
  15. P. Greve, J. Hoffman, R. E. Smith
    Using Type Enforcement to Assure a Configurable Guard. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:146-0 [Conf]
  16. J. Hoffman
    Implementing RBAC on a Type Enforced System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:158-163 [Conf]
  17. T. F. Himdi, Ravi S. Sandhu
    Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:164-174 [Conf]
  18. T. Mitchem, R. Lu, R. O'Brian
    Using Kernel Hypervisors to Secure Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:175-0 [Conf]
  19. T. Lowman, D. Mosier
    Applying the DOD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architecture. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:183-193 [Conf]
  20. Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
    An Architecture for Multilevel Secure Interoperability. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:194-204 [Conf]
  21. R. E. Niemeyer
    Using Web Technologies in Two MLS Environments: A Security Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:205-0 [Conf]
  22. Yung-Cheng Lee, Chi-Sung Laih
    On the Key Recovery of the Key Escrow System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:216-220 [Conf]
  23. Chih-Hung Wang, Tzonelih Hwang
    Threshold and Generalized DSS Signatures without a Trusted Party. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:221-226 [Conf]
  24. Bruce Schneier, Chris Hall
    An Improved E-Mail Security Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:227-0 [Conf]
  25. Chris Hall, Bruce Schneier
    Remote Electronic Gambling. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:232-238 [Conf]
  26. F. C. Smith
    Ethical Responsibilities and Legal Liabilities of Network Security Professionals. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:239-250 [Conf]
  27. D. B. Baker, R. M. Barnhart, T. T. Buss
    PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:251-0 [Conf]
  28. John P. McDermott, R. Gelinas, S. Ornstein
    Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:265-0 [Conf]
  29. Carl E. Landwehr
    Protecting Unattended Computers Without Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:274-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002