Conferences in DBLP
Ian Brown , B. Laurie Security Against Compelled Disclosure. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:2-10 [Conf ] M. Petkac , Lee Badger Security Agility in Response to Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:11-20 [Conf ] Christoph C. Michael , Anup K. Ghosh Two State-based Approaches to Program-based Anomaly Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:21-0 [Conf ] E. Strother Denial of Service Protection - The Nozzle. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:32-41 [Conf ] Germano Caronni , S. Kumar , Christoph L. Schuba , G. Scott Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:42-51 [Conf ] Xunhua Wang , Yih Huang , Yvo Desmedt , David Rine Enabling Secure On-Line DNS Dynamic Update. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:52-0 [Conf ] D. Johnson , L. Benzinger Layering Boundary Protections: An Experiment in Information Assurance. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:60-66 [Conf ] John Hale , Mauricio Papa , Oliver Bremer , Rodrigo Chandia , Sujeet Shenoi Extending Java for Package based Access Control. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:67-76 [Conf ] Jalal Al-Muhtadi , Manish Anand , M. Dennis Mickunas , Roy H. Campbell Secure Smart Homes using Jini and UIUC SESAME. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:77-0 [Conf ] André L. M. dos Santos , Richard A. Kemmerer Implementing Security Policies using the Safe Areas of Computation Approach. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:90-99 [Conf ] Pablo Galiasso , Oliver Bremer , John Hale , Sujeet Shenoi , David F. Ferraiolo , Vincent C. Hu Policy Mediation for Multi-Enterprise Environments. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:100-106 [Conf ] Kai Rannenberg , Giovanni Iachello Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:107-0 [Conf ] Joon S. Park , Ravi S. Sandhu Binding Identities and Attributes using Digitally Signed Certificates. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:120-127 [Conf ] Petra Wohlmacher , Peter Pharow Applications in Health Care using Public-Key Certificates and Attribute Certificates. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:128-137 [Conf ] V. Prasad , S. Potakamuri , M. Ahern , I. Balabine , M. Lerner , P. Dutta Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:138-0 [Conf ] Victoria Ungureanu , F. Vesuna , Naftaly H. Minsky A Policy-based Access Control Mechanism for the Corporate Web. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:150-158 [Conf ] Konstantin Knorr Dynamic Access Control through Petri Net Workflows. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:159-167 [Conf ] Ezedin Barka , Ravi S. Sandhu Framework for Role-based Delegation Models. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:168-0 [Conf ] Thomas E. Daniels , Eugene H. Spafford A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:178-187 [Conf ] Danilo Bruschi , Lorenzo Cavallaro , Emilia Rosti Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:188-195 [Conf ] Heejin Jang , Sangwook Kim A Self-Extension Monitoring for Security Management. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:196-0 [Conf ] Pierre Bieber , D. Raujol , Pierre Siron Security Architecture for Federated Cooperative Information Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:208-216 [Conf ] P. C. Clark , M. C. Meissner , K. O. Vance Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:217-223 [Conf ] Jaehong Park , Ravi S. Sandhu , J. Schifalacqua Security Architectures for Controlled Digital Information Dissemination. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:224-0 [Conf ] Jeremy Epstein , L. Thomas , Eric Monteith Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:236-245 [Conf ] Chenxi Wang , John C. Knight , Matthew C. Elder On Computer Viral Infection and the Effect of Immunization. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:246-256 [Conf ] John Viega , J. T. Bloch , Y. Kohno , Gary McGraw ITS4: A Static Vulnerability Scanner for C and C++ Code. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:257-0 [Conf ] Eugenio Faldella , Marco Prandini A Novel Approach to On-Line Status Authentication of Public-Key Certificates. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:270-277 [Conf ] Peter Gutmann A Reliable, Scalable General-Purpose Certificate Store. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:278-287 [Conf ] Feng Bao Introducing Decryption Authority into PKI. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:288-0 [Conf ] Vinti Doshi , Amgad Fayad , Sushil Jajodia , Roswitha MacLean Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:298-307 [Conf ] Jens Palsberg , S. Krishnaswamy , Minseok Kwon , Di Ma , Qiuyun Shao , Y. Zhang Experience with Software Watermarking. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:308-316 [Conf ] Michael A. Schneider , Edward W. Felten Efficient Commerce Protocols based on One-Time Pads. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:317-0 [Conf ] Jeff Hayes Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:328-333 [Conf ] E. Spyropoulou , Timothy E. Levin , Cynthia E. Irvine Calculating Costs for Quality of Security Service. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:334-343 [Conf ] Uwe Jendricke , Daniela Gerd tom Markotten Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:344-0 [Conf ] Antonio Corradi , Rebecca Montanari , Cesare Stefanelli , Emil Lupu , Morris Sloman A Flexible Access Control Service for Java Mobile Code. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:356-365 [Conf ] Margus Freudenthal , S. Heiberg , Jan Willemson Personal Security Environment on Palm PDA. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:366-372 [Conf ] Reiner Sailer , M. Kabatnik History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:373-0 [Conf ] Johann Großschädl The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:384-393 [Conf ] Weiliang Zhao , Vijay Varadharajan , Yi Mu Fair On-line Gambling. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:394-400 [Conf ] Murat Aydos , T. Yanik , Çetin Kaya Koç An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:401-410 [Conf ]