The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on New Security Paradigms (NSPW) (nspw)
1998 (conf/nspw/1998)

  1. Chris Slater, O. Sami Saydjari, Bruce Schneier, Jim Wallner
    Toward a Secure System Engineering Methodolgy. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:2-10 [Conf]
  2. Marshall D. Abrams
    Security Engineering in an Evolutionary Acquisition Environment. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:11-20 [Conf]
  3. Erland Jonsson
    An Integrated Framework for Security and Dependability. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:22-29 [Conf]
  4. Thomas Riechmann, Franz J. Hauck
    Meta Objects for Access Control: a Formal Model for Role-Based Principals. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:30-38 [Conf]
  5. Simon N. Foley
    Evaluating System Integrity. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:40-47 [Conf]
  6. John P. McDermott
    Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:48-51 [Conf]
  7. Crispin Cowan, Calton Pu
    Death, Taxes, and Imperfact Software: Surviving the Inevitable. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:54-70 [Conf]
  8. Cynthia A. Phillips, Laura Painton Swiler
    A Graph-based System for Network-vulnerability Analysis. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:71-79 [Conf]
  9. LiWu Chang, Ira S. Moskowitz
    Parsimonious Downgrading and Decision Trees Applied to the Inference Problem. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:82-89 [Conf]
  10. Donald Beaver
    Server-Assisted Cryptography. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:92-106 [Conf]
  11. Steven J. Greenwald
    Discussion Topic: What is the Old Security Paradigm? [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:107-118 [Conf]
  12. Clifford Kahn
    Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:122-133 [Conf]
  13. Meng-Jang Lin, Aleta Ricciardi, Keith Marzullo
    A New Model for Availability in the Face of Self-Propagating Attacks. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:134-137 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002