The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
1998 (conf/acsac/1998)

  1. Roland Büschkes, Dogan Kesdogan, Peter Reichl
    How to Increase Security in Mobile Networks by Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:3-12 [Conf]
  2. J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni
    An Architecture for Intrusion Detection Using Autonomous Agents. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:13-24 [Conf]
  3. Giovanni Vigna, Richard A. Kemmerer
    NetSTAT: A Network-Based Intrusion Detection Approach. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:25-0 [Conf]
  4. Ravi S. Sandhu, Qamar Munawer
    The RRA97 Model for Role-Based Administration of Role Hierarchies. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:39-49 [Conf]
  5. D. J. Thomsen, D. O'Brien, J. Bogle
    Role-Based Access Control Framework for Network Enterprises. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:50-58 [Conf]
  6. P. C. Hyland, Ravi S. Sandhu
    Concentric Supervision of Security Applications: A New Security Management Paradigm. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:59-0 [Conf]
  7. Sushil Jajodia, Peng Liu, Catherine D. McCollum
    Application-Level Isolation to Cope with Malicious Database Users. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:73-82 [Conf]
  8. Quazi N. Ahmed, Susan V. Vrbsky
    Maintaining Security in Firm Real-Time Database Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:83-90 [Conf]
  9. Myong H. Kang, Judith N. Froscher, Brian J. Eppinger
    Towards an Infrastructure for MLS Distributed Computing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:91-100 [Conf]
  10. Jared Karro, Jie Wang
    Protecting Web Servers from Security Holes in Server-Side Includes. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:103-111 [Conf]
  11. Pietro Iglio, Fausto Fraticelli, Luigi Giuri
    Rule-Based Filtering for Java Applets. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:112-119 [Conf]
  12. Vesna Hassler, O. Then
    Controlling Applets' Behavior in a Browser. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:120-0 [Conf]
  13. F. C. Smith, D. J. Bailey
    Wachet auf! Computer Security and the Millenium. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:129-0 [Conf]
  14. Lucas C. Ferreira, Ricardo Dahab
    A Scheme for Analyzing Electronic Payment Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:137-146 [Conf]
  15. Kathrin Schier
    Multifunctional Smart Cards for Electronic Commerce-Application of the Role and Task-Based Security Model. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:147-154 [Conf]
  16. Alexander W. Röhm, Günther Pernul, Gaby Herrmann
    Modeling Secure and Fair Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:155-0 [Conf]
  17. Roger Wright, David J. Shifflett, Cynthia E. Irvine
    Security Architecture for a Virtual Heterogeneous Machine. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:167-177 [Conf]
  18. Vijay Varadharajan, C. Crall, Joe Pato
    Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:178-189 [Conf]
  19. Bryony Pomeroy, Simon R. Wiseman
    Private Desktops and Shared Store. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:190-0 [Conf]
  20. Herbert Leitold, Udo Payer, Reinhard Posch
    A Hardware-Independent Encryption Model for ATM Devices. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:205-211 [Conf]
  21. Rajan Shankaran, Vijay Varadharajan
    Secure Signaling and Access Control for ATM Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:212-222 [Conf]
  22. Reiner Sailer
    Security Services in an Open Service Environment. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:223-0 [Conf]
  23. Yuh-Min Tseng, Jinn-ke Jan
    ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:237-243 [Conf]
  24. Chang N. Zhang, Ming Y. Deng, Ralph Mason
    Two Improved Algorithms and Hardware Implementations for Key Distribution Using Extended Programmable Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:244-249 [Conf]
  25. M. A. Bahie-Eldin, A. A. Omar
    Complexity Measure of Encryption Keys Used for Securing Computer Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:250-0 [Conf]
  26. Anup K. Gosh, James Wanken, Frank Charron
    Detecting Anomalous and Unknown Intrusions Against Programs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:259-267 [Conf]
  27. D. Endler
    Intrusion Detection Applying Machine Learning to Solaris Audit Data. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:268-279 [Conf]
  28. Edward Amoroso, R. Kwapniewski
    Selection Criteria for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:280-0 [Conf]
  29. Yi Mu, Vijay Varadharajan
    Anonymous Secure E-Voting Over a Network. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:293-299 [Conf]
  30. Michael Clifford, C. Lavine, Matt Bishop
    The Solar Trust Model: Authentication Without Limitation. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:300-307 [Conf]
  31. T. G. Brutch, P. C. Brutch
    Mutual Authentication, Confidentiality, and Key Management (MACKMAN) System for Mobile Computing and Wireless Communication. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:308-0 [Conf]
  32. Mourad Debbabi, Y. Legaré, Mohamed Mejri
    An Environment for the Specification and Analysis of Cryptoprotocols. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:321-332 [Conf]
  33. G. F. Jelen, J. R. Williams
    A Practical Approach to Measuring Assurance. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:333-0 [Conf]
  34. Bruce Schneier, James Riordan
    A Certified E-Mail Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:347-352 [Conf]
  35. Michiharu Kudo
    Electronic Submission Protocol Based on Temporal Accountability. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:353-364 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002