Conferences in DBLP
Roland Büschkes , Dogan Kesdogan , Peter Reichl How to Increase Security in Mobile Networks by Anomaly Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:3-12 [Conf ] J. S. Balasubramaniyan , J. O. Garcia-Fernandez , D. Isacoff , Eugene H. Spafford , Diego Zamboni An Architecture for Intrusion Detection Using Autonomous Agents. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:13-24 [Conf ] Giovanni Vigna , Richard A. Kemmerer NetSTAT: A Network-Based Intrusion Detection Approach. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:25-0 [Conf ] Ravi S. Sandhu , Qamar Munawer The RRA97 Model for Role-Based Administration of Role Hierarchies. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:39-49 [Conf ] D. J. Thomsen , D. O'Brien , J. Bogle Role-Based Access Control Framework for Network Enterprises. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:50-58 [Conf ] P. C. Hyland , Ravi S. Sandhu Concentric Supervision of Security Applications: A New Security Management Paradigm. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:59-0 [Conf ] Sushil Jajodia , Peng Liu , Catherine D. McCollum Application-Level Isolation to Cope with Malicious Database Users. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:73-82 [Conf ] Quazi N. Ahmed , Susan V. Vrbsky Maintaining Security in Firm Real-Time Database Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:83-90 [Conf ] Myong H. Kang , Judith N. Froscher , Brian J. Eppinger Towards an Infrastructure for MLS Distributed Computing. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:91-100 [Conf ] Jared Karro , Jie Wang Protecting Web Servers from Security Holes in Server-Side Includes. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:103-111 [Conf ] Pietro Iglio , Fausto Fraticelli , Luigi Giuri Rule-Based Filtering for Java Applets. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:112-119 [Conf ] Vesna Hassler , O. Then Controlling Applets' Behavior in a Browser. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:120-0 [Conf ] F. C. Smith , D. J. Bailey Wachet auf! Computer Security and the Millenium. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:129-0 [Conf ] Lucas C. Ferreira , Ricardo Dahab A Scheme for Analyzing Electronic Payment Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:137-146 [Conf ] Kathrin Schier Multifunctional Smart Cards for Electronic Commerce-Application of the Role and Task-Based Security Model. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:147-154 [Conf ] Alexander W. Röhm , Günther Pernul , Gaby Herrmann Modeling Secure and Fair Electronic Commerce. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:155-0 [Conf ] Roger Wright , David J. Shifflett , Cynthia E. Irvine Security Architecture for a Virtual Heterogeneous Machine. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:167-177 [Conf ] Vijay Varadharajan , C. Crall , Joe Pato Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:178-189 [Conf ] Bryony Pomeroy , Simon R. Wiseman Private Desktops and Shared Store. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:190-0 [Conf ] Herbert Leitold , Udo Payer , Reinhard Posch A Hardware-Independent Encryption Model for ATM Devices. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:205-211 [Conf ] Rajan Shankaran , Vijay Varadharajan Secure Signaling and Access Control for ATM Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:212-222 [Conf ] Reiner Sailer Security Services in an Open Service Environment. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:223-0 [Conf ] Yuh-Min Tseng , Jinn-ke Jan ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:237-243 [Conf ] Chang N. Zhang , Ming Y. Deng , Ralph Mason Two Improved Algorithms and Hardware Implementations for Key Distribution Using Extended Programmable Cellular Automata. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:244-249 [Conf ] M. A. Bahie-Eldin , A. A. Omar Complexity Measure of Encryption Keys Used for Securing Computer Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:250-0 [Conf ] Anup K. Gosh , James Wanken , Frank Charron Detecting Anomalous and Unknown Intrusions Against Programs. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:259-267 [Conf ] D. Endler Intrusion Detection Applying Machine Learning to Solaris Audit Data. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:268-279 [Conf ] Edward Amoroso , R. Kwapniewski Selection Criteria for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:280-0 [Conf ] Yi Mu , Vijay Varadharajan Anonymous Secure E-Voting Over a Network. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:293-299 [Conf ] Michael Clifford , C. Lavine , Matt Bishop The Solar Trust Model: Authentication Without Limitation. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:300-307 [Conf ] T. G. Brutch , P. C. Brutch Mutual Authentication, Confidentiality, and Key Management (MACKMAN) System for Mobile Computing and Wireless Communication. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:308-0 [Conf ] Mourad Debbabi , Y. Legaré , Mohamed Mejri An Environment for the Specification and Analysis of Cryptoprotocols. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:321-332 [Conf ] G. F. Jelen , J. R. Williams A Practical Approach to Measuring Assurance. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:333-0 [Conf ] Bruce Schneier , James Riordan A Certified E-Mail Protocol. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:347-352 [Conf ] Michiharu Kudo Electronic Submission Protocol Based on Temporal Accountability. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:353-364 [Conf ]