The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1999 (conf/sp/1999)

  1. Timothy Fraser, Lee Badger, Mark Feldman
    Hardening COTS Software with Generic Software Wrappers. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:2-16 [Conf]
  2. Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool
    Firmato: A Novel Firewall Management Toolkit. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:17-31 [Conf]
  3. David Evans, Andrew Twyman
    Flexible Policy-Directed Code Safety. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:32-45 [Conf]
  4. Jonathan K. Millen
    Local Reconfiguration Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:48-56 [Conf]
  5. Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
    A User-Centered, Modular Authorization Service Built on an RBAC Foundation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:57-71 [Conf]
  6. Martín Abadi, Cédric Fournet, Georges Gonthier
    Secure Communications Processing for Distributed Languages. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:74-88 [Conf]
  7. Thomas P. Jensen, Daniel Le Métayer, Tommy Thorn
    Verification of Control Flow based Security Properties. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:89-103 [Conf]
  8. G. R. Blakley
    Twenty Years of Cryptography in the Open Literature. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:106-107 [Conf]
  9. Virgil D. Gligor
    20 Years of Operating Systems Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:108-110 [Conf]
  10. Steven B. Lipner
    Twenty Years of Evaluation Criteria and Commercial Technology. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:111-112 [Conf]
  11. Jonathan K. Millen
    20 Years of Covert Channel Modeling and Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:113-114 [Conf]
  12. John McLean
    Twenty Years of Formal Methods. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:115-116 [Conf]
  13. Stephen T. Kent
    Network Security: Then and Now, or, 20 Years in 10 Minutes. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:117- [Conf]
  14. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
    A Data Mining Framework for Building Intrusion Detection Models. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:120-132 [Conf]
  15. Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter
    Detecting Intrusions using System Calls: Alternative Data Models. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:133-145 [Conf]
  16. Ulf Lindqvist, Phillip A. Porras
    Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST). [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:146-161 [Conf]
  17. Haruna R. Isa, William R. Shockley, Cynthia E. Irvine
    A Multi-Threading Architecture for Multilevel Secure Transaction Processing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:166-180 [Conf]
  18. Steven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Specification and Enforcement of Classification and Inference Constraints. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:181-195 [Conf]
  19. David Rosenthal, Francis Fung
    A Test for Non-Disclosure in Security Level Translations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:196-206 [Conf]
  20. Douglas N. Hoover, B. N. Kausik
    Software Smart Cards via Cryptographic Camouflage. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:208-215 [Conf]
  21. Catherine Meadows
    Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:216-231 [Conf]
  22. Mark Weiser
    How Computers Will Be Used Differently in the Next Twenty Years. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:234-235 [Conf]
  23. Roger M. Needham
    The Hardware Environment. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:236- [Conf]
  24. Howard E. Shrobe
    Software Technology of the Future. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:237-238 [Conf]
  25. Hilarie K. Orman
    Twenty Year Time Capsule Panel: The Future of Networking. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:239- [Conf]
  26. Brian D. Snow
    The Future Is Not Assured - But It Should Be. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:240-241 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002