The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
2000 (conf/acsac/2000)

  1. Ian Brown, B. Laurie
    Security Against Compelled Disclosure. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:2-10 [Conf]
  2. M. Petkac, Lee Badger
    Security Agility in Response to Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:11-20 [Conf]
  3. Christoph C. Michael, Anup K. Ghosh
    Two State-based Approaches to Program-based Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:21-0 [Conf]
  4. E. Strother
    Denial of Service Protection - The Nozzle. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:32-41 [Conf]
  5. Germano Caronni, S. Kumar, Christoph L. Schuba, G. Scott
    Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:42-51 [Conf]
  6. Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine
    Enabling Secure On-Line DNS Dynamic Update. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:52-0 [Conf]
  7. D. Johnson, L. Benzinger
    Layering Boundary Protections: An Experiment in Information Assurance. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:60-66 [Conf]
  8. John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi
    Extending Java for Package based Access Control. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:67-76 [Conf]
  9. Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell
    Secure Smart Homes using Jini and UIUC SESAME. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:77-0 [Conf]
  10. André L. M. dos Santos, Richard A. Kemmerer
    Implementing Security Policies using the Safe Areas of Computation Approach. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:90-99 [Conf]
  11. Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu
    Policy Mediation for Multi-Enterprise Environments. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:100-106 [Conf]
  12. Kai Rannenberg, Giovanni Iachello
    Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:107-0 [Conf]
  13. Joon S. Park, Ravi S. Sandhu
    Binding Identities and Attributes using Digitally Signed Certificates. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:120-127 [Conf]
  14. Petra Wohlmacher, Peter Pharow
    Applications in Health Care using Public-Key Certificates and Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:128-137 [Conf]
  15. V. Prasad, S. Potakamuri, M. Ahern, I. Balabine, M. Lerner, P. Dutta
    Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:138-0 [Conf]
  16. Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky
    A Policy-based Access Control Mechanism for the Corporate Web. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:150-158 [Conf]
  17. Konstantin Knorr
    Dynamic Access Control through Petri Net Workflows. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:159-167 [Conf]
  18. Ezedin Barka, Ravi S. Sandhu
    Framework for Role-based Delegation Models. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:168-0 [Conf]
  19. Thomas E. Daniels, Eugene H. Spafford
    A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:178-187 [Conf]
  20. Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
    Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:188-195 [Conf]
  21. Heejin Jang, Sangwook Kim
    A Self-Extension Monitoring for Security Management. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:196-0 [Conf]
  22. Pierre Bieber, D. Raujol, Pierre Siron
    Security Architecture for Federated Cooperative Information Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:208-216 [Conf]
  23. P. C. Clark, M. C. Meissner, K. O. Vance
    Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:217-223 [Conf]
  24. Jaehong Park, Ravi S. Sandhu, J. Schifalacqua
    Security Architectures for Controlled Digital Information Dissemination. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:224-0 [Conf]
  25. Jeremy Epstein, L. Thomas, Eric Monteith
    Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:236-245 [Conf]
  26. Chenxi Wang, John C. Knight, Matthew C. Elder
    On Computer Viral Infection and the Effect of Immunization. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:246-256 [Conf]
  27. John Viega, J. T. Bloch, Y. Kohno, Gary McGraw
    ITS4: A Static Vulnerability Scanner for C and C++ Code. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:257-0 [Conf]
  28. Eugenio Faldella, Marco Prandini
    A Novel Approach to On-Line Status Authentication of Public-Key Certificates. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:270-277 [Conf]
  29. Peter Gutmann
    A Reliable, Scalable General-Purpose Certificate Store. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:278-287 [Conf]
  30. Feng Bao
    Introducing Decryption Authority into PKI. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:288-0 [Conf]
  31. Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean
    Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:298-307 [Conf]
  32. Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang
    Experience with Software Watermarking. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:308-316 [Conf]
  33. Michael A. Schneider, Edward W. Felten
    Efficient Commerce Protocols based on One-Time Pads. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:317-0 [Conf]
  34. Jeff Hayes
    Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:328-333 [Conf]
  35. E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvine
    Calculating Costs for Quality of Security Service. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:334-343 [Conf]
  36. Uwe Jendricke, Daniela Gerd tom Markotten
    Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:344-0 [Conf]
  37. Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman
    A Flexible Access Control Service for Java Mobile Code. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:356-365 [Conf]
  38. Margus Freudenthal, S. Heiberg, Jan Willemson
    Personal Security Environment on Palm PDA. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:366-372 [Conf]
  39. Reiner Sailer, M. Kabatnik
    History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:373-0 [Conf]
  40. Johann Großschädl
    The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:384-393 [Conf]
  41. Weiliang Zhao, Vijay Varadharajan, Yi Mu
    Fair On-line Gambling. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:394-400 [Conf]
  42. Murat Aydos, T. Yanik, Çetin Kaya Koç
    An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:401-410 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002